Optimize IAS
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
    • Mains Master Notes
  • Portal Login
    • Home
    • About Us
    • Courses
      • Prelims Test Series
        • LAQSHYA 2026 Prelims Mentorship
      • Mains Mentorship
        • Arjuna 2026 Mains Mentorship
      • Mains Master Notes
    • Portal Login

    End to End Encryption

    • December 12, 2022
    • Posted by: OptimizeIAS Team
    • Category: DPN Topics
    No Comments

     

     

    End to End Encryption

    Subject: Science and Development

    Context:

    • Apple, on December 07,2022 announced the introduction of end-to-end encryption for most of the data on iCloud by early 2023.
    • Apple announced that it will be increasing the number of data points protected by end-to-end encryption on iCloud from 14 to 23 categories.
    • The company claimed that with end-to-end encryption, user data will be protected even in case data is breached in the cloud.
    • Similarly, Elon Musk, CEO of Twitter recently pushed for Twitter directing messaging’s (DMs) to be encrypted.
    • Many popular messaging service providers use end-to-end encryption, including Facebook, WhatsApp and Zoom.
    • However, several government agencies are not happy with the recent development..

    What is End to End Encryption

    • End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it’s transferred from one end system or device to another.
    • It prevents third parties like cloud service providers, internet service providers (ISPs) and cybercriminals from accessing data while it is being transferred.
    • End-to-end encryption uses an algorithm to convert plain text into an unintelligible format.
    • Exclusively individuals having the decryption keys, which are only kept on endpoints and not with any other parties like service providers, can decode and read this format.
    • When sending corporate documents, financial information, legal documents, and private discussions, end-to-end encryption has long been employed. Additionally, it may be used to manage user authorization for access to stored data.

    Significance

    • End-to-end encryption is used to secure communications in instant messaging and also used to secure passwords, protect stored data and safeguard data on cloud storage.
    • Extra layer of protection would be valuable to targets of hacking attacks launched by well-funded groups.
    • End-to-end encryption promotes data protection and prevents unauthorised access to personal data.
    • End-to-end encryption is also viewed as a technology that protects user data from government snooping, making it a desired feature by political opponents, journalists, and activists.

    Government agencies standpoint:

    • Attempts by government agencies across the globe, in the past, to access encrypted data hosted and stored by tech companies have met with strong resistance.
    • Encrypted messages can be used by terrorists and other non state elements that can threaten sovereignty and integrity of nation.
    • In 2019, the U. S., the U. K., and Australia planned to pressure Facebook to create a backdoor into its encrypted messaging apps to allow governments to access the contents of private communications.
    • In 2018, Australia passed legislation that would force tech companies and service providers to build capabilities allowing law enforcement secret access to messages on platforms like WhatsApp and Facebook.
    • It becomes more challenging to censor social media trolls, hate speech, and child pornography.
    • End-to-end encryption does not protect metadata, which includes information like when a file was created, the date when a message is sent and the endpoints between which data was shared.
    End-to-End Encryption Science and development
    Footer logo
    Copyright © 2015 MasterStudy Theme by Stylemix Themes
        Search