{"id":2985,"date":"2026-04-28T14:13:12","date_gmt":"2026-04-28T18:13:12","guid":{"rendered":"https:\/\/www.thexyz.com\/blog\/?p=2985"},"modified":"2026-04-28T14:24:31","modified_gmt":"2026-04-28T18:24:31","slug":"canadas-bill-c-2-and-the-future-of-secure-communication","status":"publish","type":"post","link":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/","title":{"rendered":"Canada\u2019s Bill C-2 and the Future of Secure Communication"},"content":{"rendered":"<p data-start=\"307\" data-end=\"437\">Canada has introduced Bill C-2, a broad piece of legislation aimed at strengthening border security and combating financial crime.<\/p>\n<p data-start=\"439\" data-end=\"540\">\ud83d\udc49 <strong><a class=\"decorated-link\" href=\"https:\/\/www.parl.ca\/DocumentViewer\/en\/45-1\/bill\/C-2\/first-reading\" target=\"_new\" rel=\"noopener\" data-start=\"442\" data-end=\"540\">Read Bill C-2 (First Reading)<\/a><\/strong><\/p>\n<p data-start=\"542\" data-end=\"678\">At a high level, the goals are clear: reduce illicit activity, improve enforcement, and modernize Canada\u2019s response to evolving threats.<\/p>\n<p data-start=\"680\" data-end=\"831\">But as with many large-scale security laws, the details matter, and some aspects are raising important questions about privacy and secure communication.<\/p>\n<hr data-start=\"833\" data-end=\"836\" \/>\n<h2 data-section-id=\"1lshg1q\" data-start=\"838\" data-end=\"865\">What Bill C-2 aims to do<\/h2>\n<p data-start=\"867\" data-end=\"976\">Bill C-2 (often referred to as the <em data-start=\"902\" data-end=\"922\">Strong Borders Act<\/em>) introduces changes across multiple areas, including:<\/p>\n<ul data-start=\"978\" data-end=\"1093\">\n<li data-section-id=\"ob44na\" data-start=\"978\" data-end=\"1015\">Anti-money laundering enforcement<\/li>\n<li data-section-id=\"1e7a8mx\" data-start=\"1016\" data-end=\"1044\">Border security measures<\/li>\n<li data-section-id=\"ty95vr\" data-start=\"1045\" data-end=\"1093\">Expanded investigative and compliance powers<\/li>\n<\/ul>\n<p data-start=\"1095\" data-end=\"1198\">These updates are designed to address increasingly complex global crime networks and financial systems.<\/p>\n<hr data-start=\"1200\" data-end=\"1203\" \/>\n<h2 data-section-id=\"1rjboyq\" data-start=\"1205\" data-end=\"1238\">Where concerns begin to emerge<\/h2>\n<p data-start=\"1240\" data-end=\"1415\">While much of the bill focuses on financial oversight, broader analysis suggests it could also expand how authorities access and use data\u2014particularly in digital environments.<\/p>\n<p data-start=\"1417\" data-end=\"1458\">That includes potential implications for:<\/p>\n<ul data-start=\"1460\" data-end=\"1589\">\n<li data-section-id=\"1lhsvda\" data-start=\"1460\" data-end=\"1507\">Online services and communication platforms<\/li>\n<li data-section-id=\"182c79n\" data-start=\"1508\" data-end=\"1541\">Data sharing between agencies<\/li>\n<li data-section-id=\"oxgc81\" data-start=\"1542\" data-end=\"1589\">Subscriber and identity-related information<\/li>\n<\/ul>\n<p data-start=\"1591\" data-end=\"1709\">Even if not explicitly targeting encryption, the structure of such laws can shape what becomes possible in the future.<\/p>\n<hr data-start=\"1711\" data-end=\"1714\" \/>\n<h2 data-section-id=\"1dcfw14\" data-start=\"1716\" data-end=\"1759\">A wider conversation about lawful access<\/h2>\n<p data-start=\"1761\" data-end=\"1835\">The debate around \u201clawful access\u201d isn\u2019t new, and it\u2019s not unique to Canada.<\/p>\n<p data-start=\"1837\" data-end=\"1995\">Organizations like the <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Internet Society<\/span><\/span> have raised concerns about similar proposals in Canada, including past efforts such as Bill C-22.<\/p>\n<p data-start=\"1997\" data-end=\"2039\"><strong><a href=\"https:\/\/www.internetsociety.org\/our-work\/internet-policy\/keep-canada-protected\/\" target=\"_blank\" rel=\"noopener\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Internet Society Keep Canada Protected campaign<\/span><\/span><\/a><\/strong><\/p>\n<p data-start=\"2041\" data-end=\"2189\">Their position is clear: introducing mechanisms that weaken encryption or create access pathways\u2014even with good intentions\u2014can create broader risks.<\/p>\n<p data-start=\"2191\" data-end=\"2228\">One of their key arguments is simple:<\/p>\n<blockquote data-start=\"2230\" data-end=\"2293\">\n<p data-start=\"2232\" data-end=\"2293\">You cannot create a backdoor that only \u201cgood actors\u201d can use.<\/p>\n<\/blockquote>\n<p data-start=\"2295\" data-end=\"2425\">Any system designed to allow access can potentially be exploited, by cybercriminals, foreign actors, or unintended vulnerabilities.<\/p>\n<hr data-start=\"2427\" data-end=\"2430\" \/>\n<h2 data-section-id=\"1sw0tly\" data-start=\"2432\" data-end=\"2472\">Why encryption matters more than ever<\/h2>\n<p data-start=\"2474\" data-end=\"2551\">Encryption isn\u2019t just a technical feature, it underpins everyday digital life.<\/p>\n<p data-start=\"2553\" data-end=\"2565\">It protects:<\/p>\n<ul data-start=\"2567\" data-end=\"2667\">\n<li data-section-id=\"1d2b2z\" data-start=\"2567\" data-end=\"2592\">Private conversations<\/li>\n<li data-section-id=\"1ysmtpy\" data-start=\"2593\" data-end=\"2619\">Financial transactions<\/li>\n<li data-section-id=\"hfk7l\" data-start=\"2620\" data-end=\"2639\">Healthcare data<\/li>\n<li data-section-id=\"1udj1z1\" data-start=\"2640\" data-end=\"2667\">Business communications<\/li>\n<\/ul>\n<p data-start=\"2669\" data-end=\"2745\">Weakening that protection, even slightly can have wide-reaching consequences.<\/p>\n<p data-start=\"2747\" data-end=\"2797\">The Internet Society and other experts argue that:<\/p>\n<ul data-start=\"2799\" data-end=\"2982\">\n<li data-section-id=\"j0h2sk\" data-start=\"2799\" data-end=\"2864\">Security failures often happen due to human error, not intent<\/li>\n<li data-section-id=\"3875kb\" data-start=\"2865\" data-end=\"2927\">Introducing access mechanisms increases the attack surface<\/li>\n<li data-section-id=\"h3giis\" data-start=\"2928\" data-end=\"2982\">A single vulnerability can have system-wide impact<\/li>\n<\/ul>\n<hr data-start=\"2984\" data-end=\"2987\" \/>\n<h2 data-section-id=\"1heeemj\" data-start=\"2989\" data-end=\"3026\">Economic and security implications<\/h2>\n<p data-start=\"3028\" data-end=\"3086\">Beyond privacy, there\u2019s also a broader impact to consider.<\/p>\n<p data-start=\"3088\" data-end=\"3145\">Policies that reduce trust in digital systems can affect:<\/p>\n<ul data-start=\"3147\" data-end=\"3295\">\n<li data-section-id=\"1fmv438\" data-start=\"3147\" data-end=\"3189\">Consumer confidence in online services<\/li>\n<li data-section-id=\"dkac7j\" data-start=\"3190\" data-end=\"3250\">Business willingness to operate in certain jurisdictions<\/li>\n<li data-section-id=\"3p7kxk\" data-start=\"3251\" data-end=\"3295\">Costs related to cybersecurity incidents<\/li>\n<\/ul>\n<p data-start=\"3297\" data-end=\"3437\">Canada\u2019s digital economy depends heavily on secure infrastructure. Any perception that systems are less secure can ripple across industries.<\/p>\n<hr data-start=\"3439\" data-end=\"3442\" \/>\n<h2 data-section-id=\"80x04f\" data-start=\"3444\" data-end=\"3471\">A global trend in motion<\/h2>\n<p data-start=\"3473\" data-end=\"3532\">Canada\u2019s approach reflects a broader international pattern.<\/p>\n<p data-start=\"3534\" data-end=\"3715\">Countries within the <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Five Eyes<\/span><\/span> alliance including the U.S., UK, and Australia\u2014have introduced laws expanding surveillance or data access in recent years.<\/p>\n<p data-start=\"3717\" data-end=\"3734\">Examples include:<\/p>\n<ul data-start=\"3736\" data-end=\"3886\">\n<li data-section-id=\"eh3tsc\" data-start=\"3736\" data-end=\"3781\">The <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Online Safety Act<\/span><\/span><\/li>\n<li data-section-id=\"t63riz\" data-start=\"3782\" data-end=\"3835\">Australia\u2019s <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Telecommunications and Other Legislation Amendment (TOLA)<\/span><\/span><\/li>\n<li data-section-id=\"pc5v7u\" data-start=\"3836\" data-end=\"3886\">The U.S. <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Foreign Intelligence Surveillance Act<\/span><\/span><\/li>\n<\/ul>\n<p data-start=\"3888\" data-end=\"3978\">Each has sparked debate about where the line should be drawn between security and privacy.<\/p>\n<hr data-start=\"3980\" data-end=\"3983\" \/>\n<h2 data-section-id=\"cq9zg\" data-start=\"3985\" data-end=\"4021\">The challenge: security vs. trust<\/h2>\n<p data-start=\"4023\" data-end=\"4079\">Governments argue that stronger powers are necessary to:<\/p>\n<ul data-start=\"4081\" data-end=\"4169\">\n<li data-section-id=\"18e5ocn\" data-start=\"4081\" data-end=\"4107\">Combat financial crime<\/li>\n<li data-section-id=\"108pum5\" data-start=\"4108\" data-end=\"4129\">Prevent terrorism<\/li>\n<li data-section-id=\"p47hfv\" data-start=\"4130\" data-end=\"4169\">Address organized criminal networks<\/li>\n<\/ul>\n<p data-start=\"4171\" data-end=\"4219\">At the same time, critics highlight a key issue:<\/p>\n<p data-start=\"4221\" data-end=\"4336\">Trust cannot exist if users believe their private communications may be accessed through unclear or evolving rules.<\/p>\n<p data-start=\"4338\" data-end=\"4398\">Clear safeguards, transparency, and oversight are essential.<\/p>\n<hr data-start=\"4400\" data-end=\"4403\" \/>\n<h2 data-section-id=\"5pbj05\" data-start=\"4405\" data-end=\"4431\">Why this matters to you<\/h2>\n<p data-start=\"4433\" data-end=\"4570\">Even if you\u2019re not directly impacted by compliance rules, legislation like Bill C-2 shapes the digital environment you rely on every day.<\/p>\n<p data-start=\"4572\" data-end=\"4586\">It influences:<\/p>\n<ul data-start=\"4588\" data-end=\"4734\">\n<li data-section-id=\"1wx4dd8\" data-start=\"4588\" data-end=\"4640\">How securely your email and messages are handled<\/li>\n<li data-section-id=\"fordha\" data-start=\"4641\" data-end=\"4689\">What data companies may be required to share<\/li>\n<li data-section-id=\"60v0c6\" data-start=\"4690\" data-end=\"4734\">How privacy protections evolve over time<\/li>\n<\/ul>\n<h2 data-section-id=\"1cdgfcn\" data-start=\"451\" data-end=\"488\">Potential Implications of Bill C-2<\/h2>\n<p data-start=\"490\" data-end=\"715\">While Bill C-2 is primarily focused on border security and financial crime, some analysts and advocacy groups have raised concerns about how certain provisions could affect privacy, due process, and data protection over time.<\/p>\n<h3 data-section-id=\"1yn9w5w\" data-start=\"717\" data-end=\"754\">Expanded access to digital data<\/h3>\n<p data-start=\"755\" data-end=\"1022\">Proposed changes may lower thresholds for accessing certain types of user data in investigations. Critics argue that this could increase the amount of information law enforcement can request from service providers, depending on how the law is interpreted and applied.<\/p>\n<h3 data-section-id=\"19wbtar\" data-start=\"1024\" data-end=\"1073\">Increased obligations for service providers<\/h3>\n<p data-start=\"1074\" data-end=\"1299\">Companies may face new requirements around retaining and providing user data. In some cases, these obligations could be accompanied by confidentiality requirements, limiting transparency around when and how data is requested.<\/p>\n<h3 data-section-id=\"jdx1e4\" data-start=\"1301\" data-end=\"1339\">Cross-border data considerations<\/h3>\n<p data-start=\"1340\" data-end=\"1612\">Bill C-2 also aligns Canada more closely with international frameworks for sharing data related to crime and security. While intended to improve cooperation, this raises questions about how Canadian user data may be accessed across jurisdictions and what safeguards apply.<\/p>\n<h3 data-section-id=\"1vg6c2k\" data-start=\"1614\" data-end=\"1649\">Legal and oversight questions<\/h3>\n<p data-start=\"1650\" data-end=\"1838\">Some critics point out that timelines and processes for challenging certain types of orders may be limited, and that strong oversight mechanisms will be essential to ensure accountability.<\/p>\n<hr data-start=\"4736\" data-end=\"4739\" \/>\n<h2 data-section-id=\"ew525n\" data-start=\"4741\" data-end=\"4762\">Thexyz perspective<\/h2>\n<p data-start=\"4764\" data-end=\"4786\">At Thexyz, we believe:<\/p>\n<ul data-start=\"4788\" data-end=\"4912\">\n<li data-section-id=\"nq2zoy\" data-start=\"4788\" data-end=\"4830\">Strong encryption should remain strong<\/li>\n<li data-section-id=\"17hy271\" data-start=\"4831\" data-end=\"4872\">Privacy should be preserved by design<\/li>\n<li data-section-id=\"6oxnyj\" data-start=\"4873\" data-end=\"4912\">Transparency is essential for trust<\/li>\n<\/ul>\n<p data-start=\"4914\" data-end=\"5034\">We support efforts to combat crime, but not at the expense of weakening the tools that keep people and businesses secure.<\/p>\n<hr data-start=\"5036\" data-end=\"5039\" \/>\n<h2 data-section-id=\"1d4cp8n\" data-start=\"5041\" data-end=\"5058\">Final thoughts<\/h2>\n<p data-start=\"5060\" data-end=\"5197\">Bill C-2 is still progressing through the legislative process, and its final impact will depend on how it is implemented and interpreted.<\/p>\n<p data-start=\"5199\" data-end=\"5244\">But the broader conversation is already here:<\/p>\n<ul data-start=\"5246\" data-end=\"5378\">\n<li data-section-id=\"i8m86l\" data-start=\"5246\" data-end=\"5278\">How much access is too much?<\/li>\n<li data-section-id=\"kqsgg0\" data-start=\"5279\" data-end=\"5321\">How do we balance safety with privacy?<\/li>\n<li data-section-id=\"1q27iuo\" data-start=\"5322\" data-end=\"5378\">And what kind of digital future do we want to build?<\/li>\n<\/ul>\n<p data-start=\"5380\" data-end=\"5457\">Because once surveillance capabilities are introduced, they rarely disappear.<\/p>\n<p data-start=\"5459\" data-end=\"5516\">Staying informed, and engaged, is more important than ever.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Canada has introduced Bill C-2, a broad piece of legislation aimed at strengthening border security and combating financial crime. \ud83d\udc49 Read Bill C-2 (First Reading) At a high level, the goals are clear: reduce illicit activity, improve enforcement, and modernize Canada\u2019s response to evolving threats. But as with many large-scale security laws, the details matter, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2986,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-2985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Canada\u2019s Bill C-2 and the Future of Secure Communication - Thexyz Blog<\/title>\n<meta name=\"description\" content=\"Bill C-2 could impact your privacy in Canada. Discover the risks to encryption, data security, and online trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Canada\u2019s New Bill C-2 Is Raising Serious Privacy Concerns\" \/>\n<meta property=\"og:description\" content=\"New Canadian law, big privacy questions. Here\u2019s how Bill C-2 could affect your data and digital security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/\" \/>\n<meta property=\"og:site_name\" content=\"Thexyz Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-28T18:13:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T18:24:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Perry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Canada\u2019s New Bill C-2 Is Raising Serious Privacy Concerns\" \/>\n<meta name=\"twitter:description\" content=\"Bill C-2 could impact your privacy in Canada. Discover the risks to encryption, data security, and online trust.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Perry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/\"},\"author\":{\"name\":\"Perry\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\"},\"headline\":\"Canada\u2019s Bill C-2 and the Future of Secure Communication\",\"datePublished\":\"2026-04-28T18:13:12+00:00\",\"dateModified\":\"2026-04-28T18:24:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/\"},\"wordCount\":915,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png\",\"articleSection\":[\"Privacy\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/\",\"url\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/\",\"name\":\"Canada\u2019s Bill C-2 and the Future of Secure Communication - Thexyz Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png\",\"datePublished\":\"2026-04-28T18:13:12+00:00\",\"dateModified\":\"2026-04-28T18:24:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\"},\"description\":\"Bill C-2 could impact your privacy in Canada. Discover the risks to encryption, data security, and online trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#primaryimage\",\"url\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png\",\"contentUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png\",\"width\":1600,\"height\":800,\"caption\":\"Stop Bill C-2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.thexyz.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Canada\u2019s Bill C-2 and the Future of Secure Communication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#website\",\"url\":\"https:\/\/www.thexyz.com\/blog\/\",\"name\":\"Thexyz Blog\",\"description\":\"Email and Domains\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.thexyz.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\",\"name\":\"Perry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"caption\":\"Perry\"},\"description\":\"Perry is founder and a developer of Thexyz. I write code to fight for our human right to privacy. I am keen to create a cloud service which is so easy to use, respects user privacy and follows best security practices. We really deserve better.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ptoone\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Canada\u2019s Bill C-2 and the Future of Secure Communication - Thexyz Blog","description":"Bill C-2 could impact your privacy in Canada. Discover the risks to encryption, data security, and online trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/","og_locale":"en_US","og_type":"article","og_title":"Canada\u2019s New Bill C-2 Is Raising Serious Privacy Concerns","og_description":"New Canadian law, big privacy questions. Here\u2019s how Bill C-2 could affect your data and digital security.","og_url":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/","og_site_name":"Thexyz Blog","article_published_time":"2026-04-28T18:13:12+00:00","article_modified_time":"2026-04-28T18:24:31+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png","type":"image\/png"}],"author":"Perry","twitter_card":"summary_large_image","twitter_title":"Canada\u2019s New Bill C-2 Is Raising Serious Privacy Concerns","twitter_description":"Bill C-2 could impact your privacy in Canada. Discover the risks to encryption, data security, and online trust.","twitter_image":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png","twitter_misc":{"Written by":"Perry","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#article","isPartOf":{"@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/"},"author":{"name":"Perry","@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223"},"headline":"Canada\u2019s Bill C-2 and the Future of Secure Communication","datePublished":"2026-04-28T18:13:12+00:00","dateModified":"2026-04-28T18:24:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/"},"wordCount":915,"commentCount":0,"image":{"@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png","articleSection":["Privacy"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/","url":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/","name":"Canada\u2019s Bill C-2 and the Future of Secure Communication - Thexyz Blog","isPartOf":{"@id":"https:\/\/www.thexyz.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#primaryimage"},"image":{"@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png","datePublished":"2026-04-28T18:13:12+00:00","dateModified":"2026-04-28T18:24:31+00:00","author":{"@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223"},"description":"Bill C-2 could impact your privacy in Canada. Discover the risks to encryption, data security, and online trust.","breadcrumb":{"@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#primaryimage","url":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png","contentUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/bill-c2.png","width":1600,"height":800,"caption":"Stop Bill C-2"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thexyz.com\/blog\/canadas-bill-c-2-and-the-future-of-secure-communication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thexyz.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Canada\u2019s Bill C-2 and the Future of Secure Communication"}]},{"@type":"WebSite","@id":"https:\/\/www.thexyz.com\/blog\/#website","url":"https:\/\/www.thexyz.com\/blog\/","name":"Thexyz Blog","description":"Email and Domains","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thexyz.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Person","@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223","name":"Perry","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","caption":"Perry"},"description":"Perry is founder and a developer of Thexyz. I write code to fight for our human right to privacy. I am keen to create a cloud service which is so easy to use, respects user privacy and follows best security practices. We really deserve better.","sameAs":["https:\/\/www.linkedin.com\/in\/ptoone\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/2985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/comments?post=2985"}],"version-history":[{"count":2,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/2985\/revisions"}],"predecessor-version":[{"id":2988,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/2985\/revisions\/2988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/media\/2986"}],"wp:attachment":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/media?parent=2985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/categories?post=2985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/tags?post=2985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}