The EU could be scanning your chats by October 2025

Status of the proposal and political process

  • The article overstates certainty: October 2025 is described as a key deliberation point, not a firm start date.
  • The scheme (“Chat Control”) has returned multiple times and been narrowly blocked by a minority of member states; it’s not a one-off Danish idea.
  • Germany’s position is seen as pivotal; past German governments helped block it, but the new government’s stance is unclear.
  • Some argue “nothing will come of it” because of likely court challenges and German resistance; others insist “it only needs to pass once” and will keep coming back until it does.

Democracy, EU institutions, and legitimacy

  • Long subthread debates whether the Commission is “unelected” and how democratic the EU really is.
  • One side: commissioners are indirectly appointed by elected governments and constrained by Parliament and courts.
  • Other side: Parliament cannot initiate laws, the Commission is shaped by opaque backroom deals, and EU-level decision-makers are weakly accountable to voters.
  • Several note that national elections, coalitions, and party politics (e.g., in Poland, Denmark, Germany) strongly shape the EU line on surveillance.

Privacy, surveillance, and authoritarian drift

  • Many see repeated attempts as evidence of an authoritarian trend in Europe, driven by fear of extremism, immigration, and unrest.
  • Concerns include chilling effects on speech, self‑censorship, and asymmetry: ordinary citizens are monitored while politicians delete or hide their own messages.
  • Some compare the EU unfavorably to the US or UK; others argue the US is already worse on surveillance and abuses.

Child protection rationale and CSAM scanning

  • Politicians and law enforcement are reported to frame scanning as necessary to combat CSAM and grooming.
  • Discussion distinguishes existing cloud CSAM scanning (hash matching of known material) from client‑side scanning and mandated backdoors.
  • One view: CSAM hash systems are narrowly scoped, heavily procedurally controlled, and already widely used.
  • Counterview: once the infrastructure exists, the hash list can silently expand (copyright, dissent, “extremism”), and independent oversight is effectively impossible.

Effectiveness, proportionality, and unintended use

  • Many argue serious criminals will simply move to “real” encryption, steganography, side‑channels, or offline methods.
  • Skeptics see the real targets as “ordinary people” and political dissent, not hardened criminals.
  • Others note law enforcement resource limits: more data won’t equal more prevention, but will enable more abuse of power.

Circumvention and alternative technologies

  • Participants discuss Signal, Matrix, XMPP, SimpleX, email-based chat, MQTT/ntfy/Gotify, SSH + talk, and mesh/LoRa systems (Meshtastic, Reticulum) as potential workarounds.
  • There’s pessimism that future laws could criminalize strong encryption or OSS tools themselves, especially for EU-based developers.

Activism, media, and “crying wolf”

  • Some fear overexposure breeds numbness (“crying wolf”); others say recurring alarm is exactly why past attempts failed.
  • Grassroots pressure, technical education (“backdoored encryption is no encryption”), and court challenges (ECJ, ECHR) are seen as the main defenses.