Detecting CSAM: Through Hashing and Intermediaries

The Cyber Blog IndiaLaw

Detecting CSAM, Hashing, and Intermediaries

Governments across the globe frequently claim child sexual abuse material (CSAM) and potential terrorist activity as justifications to support backdoors in encryption-based services. Big tech companies continue to face pressure while offering end-to-end encrypted services. Is the roll-out of on-device … Read More

Why did CCI impose a fine of тВ╣1338 crores against Google?

TannviLaw

тВ╣1338 crores fine imposed on Google

Three years after the first complaint in 2019, the Competition Commission of India (CCI) fined Google for using its dominant position in October 2022. I have previously written about Google’s overwhelming dominant position and attempts to gain control through self-preferencing. … Read More

A Beginner’s Guide to Cyber Terrorism in India

Yoshita PhaphatLaw

A Beginner's Guide to Cyber Terrorism in India

According to the Global Risks Report 2021, the failure of cyber security will be one of humanityтАЩs most significant concerns in the coming decade. With a sizeable internet population, India has confronted significant cyber terrorism challenges in the last few … Read More

рд╕реЛрд╢рд▓ рдореАрдбрд┐рдпрд╛ рдкрд░ рдлрд░реНрдЬреА рдкреНрд░реЛрдлрд╛рдЗрд▓ рдмрдирд╛рдиреЗ рд╕реЗ рд╕рдВрдмрдВрдзрд┐рдд рдХрд╛рдиреВрди

рдпрд╢ рдЬреИрдиLaw

рд╕реЛрд╢рд▓ рдореАрдбрд┐рдпрд╛ рдкрд░ рдлрд░реНрдЬреА рдкреНрд░реЛрдлрд╛рдЗрд▓ рдмрдирд╛рдиреЗ рд╕реЗ рд╕рдВрдмрдВрдзрд┐рдд рдХрд╛рдиреВрди

рдЖрдЬ рдХреА рдЗрд╕ рдбрд┐рдЬрд┐рдЯрд▓ рджреБрдирд┐рдпрд╛ рдореЗрдВ рд╕рд╛рдЗрдмрд░ рдХреНрд░рд╛рдЗрдо рддреЗреЫ рдЧрддрд┐ рд╕реЗ рдмреЭ рд░рд╣реЗ рд╣реИред рд▓реЛрдЧреЛрдВ рдХреЛ рдЕрдкрдиреЗ рдЬрд╛рд▓ рдореЗрдВ рдлрд╕рд╛рдиреЗ рдХреЗ рд▓рд┐рдП рд╕рд╛рдЗрдмрд░ рдЕрдкрд░рд╛рдзреА рдЕрдХреНрд╕рд░ рдлрд░реНрдЬреА рдкреНрд░реЛрдлрд╛рдЗрд▓ рдмрдирд╛рдХрд░ рдЙрдирдХрд╛ рднрд░реЛрд╕рд╛ рдЬрд┐рддрдиреЗ рдХреА рдХреЛрд╢рд┐рд╢ рдХрд░рддреЗ рд╣реИред рдРрд╕реЗ рдореЗрдВ рдХрдИ рдЕрдирдЬрд╛рди рд▓реЛрдЧ … Read More

Decoding DeFi

Gitanjali SadanCyber Security, Law

Decoding DeFi

Can you imagine a world where loans, insurance, and every other financial service exist in a blockchain, just like cryptocurrencies? It sounds exciting and, at the same time, complicated. This is what decentralised finance (DeFi) is all about. DeFi is … Read More

E-Waste Regulation in India

Gitanjali SadanLaw

E-Waste Regulation in India

We cannot imagine a world without electrical and electronic equipment around us. These types of equipment include your refrigerator, mobile phone, laptop, microwave oven, etc. But do you know what happens after your devices are no longer usable? They become … Read More

How does DMCA takedown work?

Gitanjali SadanLaw

How does DMCA takedown work

If you are a website owner, one of your worst nightmares will be another website copying your content. Content replication can result in copyright violation due to copyright protection available to rightful copyright owners. One such law is the Digital … Read More

Virtual Private Network (VPN): Legal or Illegal?

Garima SaxenaLaw

Virtual Private Networks (VPNs) Legal or Illegal

Myanmar’s military junta has sought to introduce a law prohibiting the use of VPNs in a move to widen its internet censorship. The proposed law stipulates imprisonment of one to three years and fines of up to 5 million Myanmar … Read More