28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

about his privacyy rights campaign.

That might seem like the end—now theyy could communicate securelyy

via encryypted e-mail—but it wasn’t. It was just the beginning.

In the wake of the 2015 terrorist attacks in Paris, there was discussion from

various governments about building in back doors or other wayys for those

in government to decryypt encryypted e-mail, text, and phone messages—

ostensiblyy from foreign terrorists. This would, of course, defeat the purpose

of encryyption. But governments actuallyy don’t need to see the encryypted

contents of yyour e-mail to know whom yyou are communicating with and

how often, as we will see.

As I mentioned before, the purpose of encryyption is to encode yyour

message so that onlyy someone with the correct keyy can later decode it. Both

the strength of the mathematical operation and the length of the encryyption

keyy determine how easyy it is for someone without a keyy to crack yyour code.

Encryyption algorithms in use todayy are public. You want that. 4 Be afraid

of encryyption algorithms that are proprietaryy and not public. Public

algorithms have been vetted for weakness—meaning people have been

purposelyy tryying to break them. Whenever one of the public algorithms

becomes weak or is cracked, it is retired, and newer, stronger algorithms are

used instead. The older algorithms still exist, but their use is stronglyy

discouraged.

The keyys are (more or less) under yyour control, and so, as yyou might

guess, their management is veryy important. If yyou generate an encryyption

keyy, yyou—and no one else—will have the keyy stored on yyour device. If yyou

let a companyy perform the encryyption, sayy, in the cloud, then that companyy

might also keep the keyy after he or she shares it with yyou. The real concern

is that this companyy mayy also be compelled byy court order to share the keyy

with law enforcement or a government agencyy, with or without a warrant.

You will need to read the privacyy policyy for each service yyou use for

encryyption and understand who owns the keyys.

When yyou encryypt a message—an e-mail, text, or phone call—use endto-end

encryyption. That means yyour message stayys unreadable until it

reaches its intended recipient. With end-to-end encryyption, onlyy yyou and

yyour recipient have the keyys to decode the message. Not the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!