logo
Combine encryption with ID checks to fight grooming, expert tells govt [WATCH]

Combine encryption with ID checks to fight grooming, expert tells govt [WATCH]

KUALA LUMPUR: Encryption plays a critical role in securing online communication and protecting users—especially children—from threats such as grooming.
Universiti Malaya forensic and cyber threat expert Professor Dr Ainuddin Wahid Abdul Wahab says that encryption can complement identity checks by providing another layer of protection.
This follows what Communications Minister Fahmi Fadzil proposed; to consider mandatory user identity verification in light of rising online sexual predatory cases.
"Encryption is really the way we can secure our communication," Ainuddin said.
He explained the concept using a simple analogy: much like parents who discreetly spell out words or speak in a language their children do not understand to keep their conversations private, encryption masks the content of digital exchanges—even if someone is aware that a communication is taking place.
This technique, he said, ensures that while a third party may see that data is being transmitted, they will not be able to decipher it without the appropriate cryptographic keys.
He also pointed to Malaysia's homegrown advancements in cryptography, particularly the In-MaLi algorithm developed locally and internationally recognised.
This cryptographic method is supported by the Malaysian Society for Cryptology Research and agencies like CyberSecurity Malaysia.
He uses the analogy of house keys and an added padlock to explain how Malaysia enhances existing global encryption tools.
"It's like renting a house and being given two keys. You're not sure who else might have copies, so you add your own padlock—your own third key. That way, only you can access it."
This "three-tier lock system", he said, reflects how Malaysia builds additional layers of encryption over standard platforms to better protect user data.
These locally developed add-ons ensure that only authorised parties—such as national cyber defence teams—can decrypt certain information, if necessary, and respond to emerging threats.
Ainuddin added that while identity verification can deter online predators, encryption remains essential to securing private communication, safeguarding children, and bolstering national cyber resilience.
On Tuesday, Fahmi said his ministry is reviewing several key measures to enhance online safety, including enforcing user verification or identity authentication.
The move, he added, is crucial to protect children from becoming victims of online sexual predators.
He expressed concern over a recent case involving a social media influencer who allegedly sent obscene images to a 14-year-old girl.
"I'm deeply troubled by what happened — an influencer contacting a 14-year-old with lewd messages. This is something happening within our society.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Dozens of troops dead after rebels overrun Mali military base
Dozens of troops dead after rebels overrun Mali military base

Free Malaysia Today

timea day ago

  • Free Malaysia Today

Dozens of troops dead after rebels overrun Mali military base

JNIM has claimed responsibility for a host of recent attacks in the Sahel region. (AFP pic) BAMAKO : An Al-Qaeda-linked rebel group active in West Africa's Sahel region has claimed responsibility for an attack on a military base in Mali yesterday that two sources said had killed more than 30 soldiers. More than 400 soldiers have reportedly been killed by insurgents since the start of May in bases and towns in Mali, Niger and Burkina Faso, an unstable region prone to coups. The extremist group, Jama'a Nusrat ul-Islam wa al-Muslimin (JNIM), said in a statement yesterday that it had seized the base in Boulkessi in central Mali, near the border with Burkina Faso. The Malian army said it had been forced to pull back. 'Many men fought, some until their last breath, to defend the Malian nation,' its statement said, without giving any casualty numbers. A spokesman did not respond to a question about the toll, but two security sources said more than 30 soldiers had been killed. A municipal source at Mondoro, near the base, said the insurgents 'cleared the camp' and that there were many dead. Videos shared online showed dozens of insurgents overrunning the base. One showed rebels stepping on the bodies of soldiers who had fallen between sandbags. Reuters could not immediately authenticate the videos. Widening insecurity JNIM has claimed responsibility for a host of recent attacks in the region. On May 24, it said it had attacked a base in Dioura, central Mali, killing 40 soldiers. Last Friday, it said it had seized a base in Sirakorola in southwestern Mali, although the army said it had repelled the attack. It did not provide a toll for that incident either. In neighbouring Burkina Faso, JNIM claimed attacks on military positions and the town of Djibo in mid-May in which it said it had killed 200 soldiers. And in Niger, more than 100 soldiers were killed in two attacks in the Tahoua region on May 24 and the Dosso region on May 26, security sources said. Neither Burkina Faso nor Niger has published an official death toll. Mali, Burkina Faso and Niger are all ruled by juntas that seized power between 2020 and 2023, citing the inability of civilian governments to stamp out jihadist insurgencies. All have cut ties with western nations and turned to Russia for military support, but are still struggling to contain violence that has displaced millions.

Combine encryption with ID checks to fight grooming, expert tells govt [WATCH]
Combine encryption with ID checks to fight grooming, expert tells govt [WATCH]

New Straits Times

time4 days ago

  • New Straits Times

Combine encryption with ID checks to fight grooming, expert tells govt [WATCH]

KUALA LUMPUR: Encryption plays a critical role in securing online communication and protecting users—especially children—from threats such as grooming. Universiti Malaya forensic and cyber threat expert Professor Dr Ainuddin Wahid Abdul Wahab says that encryption can complement identity checks by providing another layer of protection. This follows what Communications Minister Fahmi Fadzil proposed; to consider mandatory user identity verification in light of rising online sexual predatory cases. "Encryption is really the way we can secure our communication," Ainuddin said. He explained the concept using a simple analogy: much like parents who discreetly spell out words or speak in a language their children do not understand to keep their conversations private, encryption masks the content of digital exchanges—even if someone is aware that a communication is taking place. This technique, he said, ensures that while a third party may see that data is being transmitted, they will not be able to decipher it without the appropriate cryptographic keys. He also pointed to Malaysia's homegrown advancements in cryptography, particularly the In-MaLi algorithm developed locally and internationally recognised. This cryptographic method is supported by the Malaysian Society for Cryptology Research and agencies like CyberSecurity Malaysia. He uses the analogy of house keys and an added padlock to explain how Malaysia enhances existing global encryption tools. "It's like renting a house and being given two keys. You're not sure who else might have copies, so you add your own padlock—your own third key. That way, only you can access it." This "three-tier lock system", he said, reflects how Malaysia builds additional layers of encryption over standard platforms to better protect user data. These locally developed add-ons ensure that only authorised parties—such as national cyber defence teams—can decrypt certain information, if necessary, and respond to emerging threats. Ainuddin added that while identity verification can deter online predators, encryption remains essential to securing private communication, safeguarding children, and bolstering national cyber resilience. On Tuesday, Fahmi said his ministry is reviewing several key measures to enhance online safety, including enforcing user verification or identity authentication. The move, he added, is crucial to protect children from becoming victims of online sexual predators. He expressed concern over a recent case involving a social media influencer who allegedly sent obscene images to a 14-year-old girl. "I'm deeply troubled by what happened — an influencer contacting a 14-year-old with lewd messages. This is something happening within our society.

Beyond the Headlines: Rafizi out, online predators and Asean 2025 [WATCH]
Beyond the Headlines: Rafizi out, online predators and Asean 2025 [WATCH]

New Straits Times

time4 days ago

  • New Straits Times

Beyond the Headlines: Rafizi out, online predators and Asean 2025 [WATCH]

KUALA LUMPUR: In this latest episode of Beyond the Headlines, the show explores online safety and the government's proposal to introduce mandatory user identity verification. Earlier this week, the Communications Ministry said it is considering the move as a crucial step in protecting children from becoming victims of online sexual predators. This follows a disturbing case involving a social media influencer who allegedly sent obscene messages to a 14-year-old girl. Universiti Malaya forensic and cyber threat expert Professor Dr Ainuddin Wahid Abdul Wahab joins hosts Amalina Kamal and Hazween Hassan to explain how such a policy might work in practice—and what the government needs to weigh in order to balance safety regulations with freedom of speech. The show also discusses the resignation of two cabinet ministers: Datuk Seri Rafizi Ramli as Economy Minister and Nik Nazmi Nik Ahmad as Minister of Natural Resources and Environmental Sustainability. Rafizi, who had pledged to resign if he lost to Nurul Izzah Anwar in the PKR deputy presidency race last week, followed through on his promise. Nik Nazmi also stepped down after failing to retain his PKR vice-presidency and losing the Setiawangsa division chief post to Datuk Afdlin Shauki. In the second half of the episode, Beyond the Headlines recaps the recently concluded Asean and related summits hosted in Kuala Lumpur—an event that marked a milestone in regional multilateral relations. Catch the full discussion in episode 98 of Beyond the Headlines on the New Straits Times' YouTube channel, NSTOnline.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store