Optimize IAS
  • Home
  • About Us
  • Free Initiatives
    • Daily Practice Sheets
    • Daily Prelims Notes
    • Prelims Power Play
    • Mains Factly
    • Sunday Essay Sadhna
    • Mains Master Notes
  • Courses
    • Prelims 2023
      • Laqshya 2023
      • Laqshya 2023 OPTIMA
    • Integrated Guidance 2023
      • ARJUNA Prime 2023
      • ARJUNA 2023
    • Mains Guidance 2023
      • DPS Prime (Current)
      • Mains Mentorship Program (Static)
    • CSE Interview Mentorship
    • ESSAY MASTER CLASS 2023
    • ETHICS MASTER CLASS 2023
  • Downloads
    • Daily Prelims Notes Compilation
    • Daily Practice Sheet Compilation
    • PPP Compilation
    • PSIR Notes
    • General Studies Notes
    • UPSC Mains Previous Year Papers
  • Portal Login
  • Home
  • About Us
  • Free Initiatives
    • Daily Practice Sheets
    • Daily Prelims Notes
    • Prelims Power Play
    • Mains Factly
    • Sunday Essay Sadhna
    • Mains Master Notes
  • Courses
    • Prelims 2023
      • Laqshya 2023
      • Laqshya 2023 OPTIMA
    • Integrated Guidance 2023
      • ARJUNA Prime 2023
      • ARJUNA 2023
    • Mains Guidance 2023
      • DPS Prime (Current)
      • Mains Mentorship Program (Static)
    • CSE Interview Mentorship
    • ESSAY MASTER CLASS 2023
    • ETHICS MASTER CLASS 2023
  • Downloads
    • Daily Prelims Notes Compilation
    • Daily Practice Sheet Compilation
    • PPP Compilation
    • PSIR Notes
    • General Studies Notes
    • UPSC Mains Previous Year Papers
  • Portal Login

End to End Encryption

  • December 12, 2022
  • Posted by: OptimizeIAS Team
  • Category: DPN Topics
No Comments
Print Friendly, PDF & Email

 

 

End to End Encryption

Subject: Science and Development

Context:

  • Apple, on December 07,2022 announced the introduction of end-to-end encryption for most of the data on iCloud by early 2023.
  • Apple announced that it will be increasing the number of data points protected by end-to-end encryption on iCloud from 14 to 23 categories.
  • The company claimed that with end-to-end encryption, user data will be protected even in case data is breached in the cloud.
  • Similarly, Elon Musk, CEO of Twitter recently pushed for Twitter directing messaging’s (DMs) to be encrypted.
  • Many popular messaging service providers use end-to-end encryption, including Facebook, WhatsApp and Zoom.
  • However, several government agencies are not happy with the recent development..

What is End to End Encryption

  • End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it’s transferred from one end system or device to another.
  • It prevents third parties like cloud service providers, internet service providers (ISPs) and cybercriminals from accessing data while it is being transferred.
  • End-to-end encryption uses an algorithm to convert plain text into an unintelligible format.
  • Exclusively individuals having the decryption keys, which are only kept on endpoints and not with any other parties like service providers, can decode and read this format.
  • When sending corporate documents, financial information, legal documents, and private discussions, end-to-end encryption has long been employed. Additionally, it may be used to manage user authorization for access to stored data.

Significance

  • End-to-end encryption is used to secure communications in instant messaging and also used to secure passwords, protect stored data and safeguard data on cloud storage.
  • Extra layer of protection would be valuable to targets of hacking attacks launched by well-funded groups.
  • End-to-end encryption promotes data protection and prevents unauthorised access to personal data.
  • End-to-end encryption is also viewed as a technology that protects user data from government snooping, making it a desired feature by political opponents, journalists, and activists.

Government agencies standpoint:

  • Attempts by government agencies across the globe, in the past, to access encrypted data hosted and stored by tech companies have met with strong resistance.
  • Encrypted messages can be used by terrorists and other non state elements that can threaten sovereignty and integrity of nation.
  • In 2019, the U. S., the U. K., and Australia planned to pressure Facebook to create a backdoor into its encrypted messaging apps to allow governments to access the contents of private communications.
  • In 2018, Australia passed legislation that would force tech companies and service providers to build capabilities allowing law enforcement secret access to messages on platforms like WhatsApp and Facebook.
  • It becomes more challenging to censor social media trolls, hate speech, and child pornography.
  • End-to-end encryption does not protect metadata, which includes information like when a file was created, the date when a message is sent and the endpoints between which data was shared.
End-to-End Encryption Science and development
Print Friendly, PDF & Email
Loading

Recent Posts

  • Prelims Power Play 3 February 2023 February 4, 2023
  • Daily Practice Sheet 4 February 2023 February 4, 2023
  • Discuss the need to regulate Chat GPT. February 4, 2023
  • Discuss the challenges in EV transition. February 4, 2023
  • Why is Myanmar important for India? Is India losing to China in Myanmar? February 4, 2023
  • Analyse the India Myanmar relations. February 4, 2023
  • The health and education of Indians is the most important determinant of what the country can achieve during the next 25 years of Amrit Kaal. In this context, discuss the issue plaguing Indian health system February 4, 2023
  • What is JPC? Discuss its role. February 4, 2023
  • Discuss the role of Parliament in Indian polity. February 4, 2023
  • Does The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules 2021 lead to internet censorship? February 4, 2023

About

If IAS is your destination, begin your journey with Optimize IAS.

Hi There, I am Santosh I have the unique distinction of clearing all 6 UPSC CSE Prelims with huge margins.

I mastered the art of clearing UPSC CSE Prelims and in the process devised an unbeatable strategy to ace Prelims which many students struggle to do.

Free Initiatives

  • Daily Practice Sheets
  • Daily Prelims Notes
  • Mains Factly
  • Prelims Power Play
  • Sunday Essay Sadhna

My Proven Strategy

  • Interview Strategy
  • Mains Strategy
  • Motivational
  • Prelims Strategy

Contact us

moc.saiezimitpo@tcatnoc

For More Details

Work with Us

Connect With Me

Santosh Pandey Quora Santosh Sir Telegram Santosh Sir Youtube Optimize IAS Instagram

Course Portal
Search