Bonum Certa Men Certa

EPO Breaking the Law With Microsoft and Promoting Fake 'Encryption' That Violates Confidentiality on Many Levels

Video download link



Summary: An explanation of how truly ridiculous the EPO has become, handing over to Microsoft (and to the US government) just about all of the EPO's communications in direct violation of the law, as well, so the only question now is, will the law actually be enforced soon? Contact your local MP/MEP and report this to him/her.

THE EPO is breaking the law. The António Campinos regime is just as bad as Benoît Battistelli's, even when it comes to privacy and pressuring judges to allow unlawful patents, such as software patents.



Steve Rowan - Vice President DG1 - Patent Granting ProcessIn parts of the series prior to this one, including Part II, we explained what the EPO had done and why it's illegal. I recorded a video (the one above) prior to the publication of Part II.

It's a long video, we could add a lot of links to it (I thought of many that would be relevant while recording it, but failed to take notes throughout), though the ones that seem of most relevance are Microsoft and the NSA relations, the latest Exchange fiasco (as recently as hours ago they still try to distract from it), how end-to-end encryption (e2ee) really works and some background about Stephen Rowan. The full text of the communication is reproduced below:

04.02.2021

Home > Organisation > DG 1 > The Vice-President > Announcements > 2021

Outlook Migration to the Cloud



Data encryption requirements for sending highly confidential data via Outlook

As announced in previous intranet items published in May and December 2020, our Outlook mailboxes are being transferred to the cloud. The transfer will take place in phases and cover only emails since 1 January 2021. As regards the patent grant process, only the following documents are classed as "EPO strictly confidential" and must not be sent by email without encryption: (i) application documents of unpublished applications (EP, PCT, national) (ii) search reports, search opinions, communications and decisions relating to unpublished applications (iii) search statements resulting in the disclosure of unpublished application documents (Guidelines B-III, 2.4; B-IV, 2.4) (iv) documents excluded from file inspection (documents which are marked as non-public in DI+, such as dissenting opinions, medical certificates, PACE requests, etc.) Guidance for the storage of strictly confidential information in the cloud The storage of strictly confidential documents in the cloud should be avoided, and data should not be copied unnecessarily from the EPO's specialised document management systems such as DI+. In practice, this means that, instead of e.g. copying data into an email, you should send a link to the document in the document management system (see also "How to send an email with document links or zipped attachment via Outlook"). Where sharing of strictly confidential data is necessary, the data must be encrypted before storing it in the cloud or sending a link to it via email. It is strongly recommended that you do not send the data directly in an email but instead encrypt the document, store it in the cloud, e.g. on SharePoint or OneDrive, and then send the recipients a link to the encrypted document by email. The password then needs to be shared via a separate channel, e.g. in a Teams chat, via Skype or on the telephone. Sending encrypted attachments is strongly discouraged, as they might not pass spam filters: using encrypted attachments is a very common way to infect user computers, so our email gateways do not allow encrypted attachments to be sent from or to our Outlook cloud instance. The easiest and safest way of encrypting a document is to use the built-in capabilities of the Office programs. Simply protect the document with a password, which also will encrypt the document with a strong encryption algorithm. Obviously, this password should be safe. As a rule of thumb, it should be about as complex as our login passwords, but of course not identical to a password already used. Chat is a good way to send the password, as a long random password can be easily copied and pasted from the chat into the password prompt in the Office program. Examples of how to apply encryption in popular Office programs are in the document annexed here.

Reasons and background

The level of security provided by Microsoft's cloud services is very high and will even mean an improvement in information security for our email system. In the cloud, our mailboxes will be protected by the most sophisticated systems. Email in Microsoft's datacentres is stored with a high standard of encryption, both in transit and at rest. With the help of contract terms, a data protection agreement and technical implementation, the EPO has ensured the best possible protection for the data stored using Microsoft's cloud services. Microsoft guarantees that the data itself is stored on EU servers within the jurisdiction of the European data protection rules (GDPR). Under the US Foreign Intelligence and Surveillance Act (FISA) and the US Clarifying Lawful Overseas Use of Data Act (CLOUD Act), Microsoft is obliged to grant security and intelligence agencies access to data stored in its cloud, even when stored on EU servers. However, the protection level offered by Microsoft is still sufficiently high for DG 1 processes in place for confidential data exchange not to need encryption. By contrast, to comply with the highest standards, which of course include the requirements imposed under the GDPR, encryption is needed for strictly confidential data. The guidance on the use of cloud tools therefore states that it is only strictly confidential data that must not be stored in plain form in the cloud, whereas merely confidential information can be stored there without limitations. The EPO defines "strictly confidential" in its "policy for information classification" (document attached) as: EPO strictly confidential: Information unauthorised disclosure of which could compromise or cause severe damage to the EPO or could cause damage to an identifiable individual or his or her reputation. Access control cannot be delegated by the information owner, and is restricted to registered named persons only. See here for more information. The vast majority of DG 1 documents do not fall into this category, and this is true for typical performance related data too, since even poor performance must be regarded as "normal" working behaviour and cannot be considered to actually cause damage to an individual. For strictly confidential data, additional access control measures, such as registering people with access, are already implemented where required.

04.02.21 | Author: Steve Rowan - Vice President DG1 - Patent Granting Process


In Part III, which we will publish tomorrow, lots more will be shown.

Recent Techrights' Posts

EPO "Cocaine Communication Manager" - Part I - Getting the Word Out About What the 'Alicante Mafia' Did to Europe's Second-Largest Institution
Can't everyone in the European media agree that letting cokeheads run Europe's second-largest institution is a terrible idea?
IBM is Becoming "Garbage In, Garbage Out" (GIGO) "Just like Arvind and Krabanaugh." (CEO and CFO, Respectively)
There are some decent new comments about IBM this morning
 
Links 14/02/2026: Financial Woes in Hong Kong and "Hong Kong Journalists Face ‘Precarious’ Future After Jimmy Lai Jailed"
Links for the day
Gemini Links 14/02/2026: Fish Shell and Meta Slash-commands
Links for the day
Links 14/02/2026: "Bias and Toxicity in" Slop, Microsoft's Vista 11 System Update Breaks Systems Again
Links for the day
Links 14/02/2026: "Suppression of Free Speech" and "Climate Change Puts Winter Games on Thin Ice"
Links for the day
Richard Stallman in the United States - Part I - Huge Audience (Offline and Online), 'Cancel Culture' Attempted and Failed
the comeback of Richard Stallman (RMS) in the United States
GitHub Cannot Survive for Much Longer
Microsoft is trying to just hide the debt
Ed Zitron: Microsoft Is A Decaying Empire That Bet The Future On Making In Excess Of $500 Billion In New Revenue Within The Next 4 To 6 Years From AI — And It Hasn’t Made A Dime In Profit Yet
Microsoft bets its future on a bunch of nothing
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, February 13, 2026
IRC logs for Friday, February 13, 2026
Gemini Links 14/02/2026: "Throwback VR Headset" and OFFLFIRSOCH 2026
Links for the day
IBM's Accounting Claims Don't Add Up
IBM is an enigma. To Wall Street is claims to be doing extremely well, but insiders tell the complete opposite.
Links 13/02/2026: "Cofounders Fleeing MElon’s xAI" and IOC Opposes Solidarity With Ukraine's Fallen
Links for the day
Gemini Links 13/02/2026: Square Function with Diode Network and Calls Against Discord
Links for the day
Links 13/02/2026: SUSE Uses Microsoft Internally, MElon's Company Helps Turn Epstein Files Into Child Abuse (After the Pornography Scandals)
Links for the day
If Your Company Lost About 30% of Its 'Value' in 3 Months, Then Maybe It Was Never Worth What You Claimed
Does that make sense?
Pleroma is Dying
The last social control media that I joined was Pleroma
African Browser Choices Show a Growing Problem in the World Wide Web
World Wide Web (WWW) becoming little but a transport layer for a particular proprietary application (Google Chrome) [...] we're back to the late 1990s
Asia and Social Control Media
statCounter reckons it's down from over 10% to just 3% since it began tracking those things
If You Want Digital Freedom, Then Follow Richard Stallman, the "Linux" Brand Has Changed and OSI is Microsoft (GitHub)
If you want something stable and predictable, then stick with GNU, the GPL, and GCC
Solicitors Disciplinary Tribunal and SRA Failing to Curb SLAPPs Against People Who Expose Wrongdoing
We'll soon show messages that we transmitted to politicians
Beware the Latest IBM SPAM, IBM is Already Down "After Hours"
After a harsh day in Wall Street IBM's shares area already down again (after trading hours)
Radicalism in Our Communities is Mostly Corporate, Not Grassroots
Infiltration and systematic destruction can be shallowly painted as "inducing manners"
Anonymous Threats Against My Wife and Against Yours Truly
Promoting GNU/Linux and condemning people who attack GNU/Linux is not a crime
Decades-Long Microsofter (Darryl K. Taft) and TIOBE Conflate Microsoft GitHub (Proprietary) With FOSS in Microsoft-Sponsored 'News' Site
We do not intend to do a lengthy debunking because we covered this subject several times in the past
Life Gets Better After Social Control Media
Don't become part of these experiments
statCounter Suggests Americans Are Dumping Social Control Media
Are Americans getting fed up with social control media and quitting in droves?
Back Doors and Fake Security
They've militarised everything, even people's home computers
Cost-Cutting and Book-Cooking at IBM
It's like cutting salaries by more than 50%
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, February 12, 2026
IRC logs for Thursday, February 12, 2026
Microsoft Cuts Continue, Visitor Center in Redmond Shut Down
This goes on and on, leading up to the next giant wave of mass layoffs
Mainstream Media Intentionally Ignoring EPO Strikes
“EPO on Strike!”
Jeffrey Epstein crypto disclosure: uncanny timing, Bitcoin demise, pump-and-dump, ponzi schemes
Reprinted with permission from Daniel Pocock
Gemini Links 12/02/2026: Avoiding Coffee, Trying Ubuntu, and "Open Source Robot"
Links for the day
Microsoft Slop CEO Speaks of Layoffs
They will go along with the "replaced by AI" baloney
In Systematic Contempt of the British High Court, Brett Wilson LLP Spent Two Years Lying to Courts and Breaking Rules Against Us
We criticise Brett Wilson LLP quite lot because of its conduct
IBM Kyndryl as "Aggressive “Enron” Accounting"
IBM Kyndryl continues to nosedive today
Relationships evidence: Tiago, Tassia, Thais, Antonio & Debian favoritism, nepotism
Reprinted with permission from Daniel Pocock
Debian pregnancy cluster: why it is public interest
Reprinted with permission from Daniel Pocock
IBM Bubble Deflating After James Kavanaugh's Accounting Trick With 'Toxic Assets' Comes Under SEC Scrutiny
If something goes up based on false speculations, bonus numbers and self-serving lies, then it'll come back down, eventually...
The EPO's Corruption and Violation of Rules is Spreading to the United Kingdom (Software Patents)
Yesterday a letter was sent to the chief regarding salaries while reminding him of the next strike, which is only 11 days away
State of the Slop, Slopfarms Containment
Slopfarms still exist this year, but their visibility is limited
IBM Continues Tanking Today, Already $58+ Lower Than Recent High, Insiders Explain Why
The same CFO from the inception of Kyndryl is still the CFO at IBM
Links 12/02/2026: Pushback Against, "NATO Is Expected to Step Up Arctic Security"
Links for the day
Links 12/02/2026: "Microsoft Just Forked Windows" and Windows Notepad is a Giant Security Hole
Links for the day
Put Criminals in Prison, Not People Who Report the Crimes
Can people be sent to prison for opposing crime?
Windows Has Become Increasingly Irrelevant
There's a very massive wave of layoffs coming Microsoft's way
Our Most Successful Year Ever
The hired guns in London are eager to turn the UK into another China
Slopfarms Waning, But Not Extinct Yet
Metrics show that usage of LLMs is declining
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, February 11, 2026
IRC logs for Wednesday, February 11, 2026