End to End Encryption
- December 12, 2022
- Posted by: OptimizeIAS Team
- Category: DPN Topics
End to End Encryption
Subject: Science and Development
- Apple, on December 07,2022 announced the introduction of end-to-end encryption for most of the data on iCloud by early 2023.
- Apple announced that it will be increasing the number of data points protected by end-to-end encryption on iCloud from 14 to 23 categories.
- The company claimed that with end-to-end encryption, user data will be protected even in case data is breached in the cloud.
- Similarly, Elon Musk, CEO of Twitter recently pushed for Twitter directing messaging’s (DMs) to be encrypted.
- Many popular messaging service providers use end-to-end encryption, including Facebook, WhatsApp and Zoom.
- However, several government agencies are not happy with the recent development..
What is End to End Encryption
- End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it’s transferred from one end system or device to another.
- It prevents third parties like cloud service providers, internet service providers (ISPs) and cybercriminals from accessing data while it is being transferred.
- End-to-end encryption uses an algorithm to convert plain text into an unintelligible format.
- Exclusively individuals having the decryption keys, which are only kept on endpoints and not with any other parties like service providers, can decode and read this format.
- When sending corporate documents, financial information, legal documents, and private discussions, end-to-end encryption has long been employed. Additionally, it may be used to manage user authorization for access to stored data.
- End-to-end encryption is used to secure communications in instant messaging and also used to secure passwords, protect stored data and safeguard data on cloud storage.
- Extra layer of protection would be valuable to targets of hacking attacks launched by well-funded groups.
- End-to-end encryption promotes data protection and prevents unauthorised access to personal data.
- End-to-end encryption is also viewed as a technology that protects user data from government snooping, making it a desired feature by political opponents, journalists, and activists.
Government agencies standpoint:
- Attempts by government agencies across the globe, in the past, to access encrypted data hosted and stored by tech companies have met with strong resistance.
- Encrypted messages can be used by terrorists and other non state elements that can threaten sovereignty and integrity of nation.
- In 2019, the U. S., the U. K., and Australia planned to pressure Facebook to create a backdoor into its encrypted messaging apps to allow governments to access the contents of private communications.
- In 2018, Australia passed legislation that would force tech companies and service providers to build capabilities allowing law enforcement secret access to messages on platforms like WhatsApp and Facebook.
- It becomes more challenging to censor social media trolls, hate speech, and child pornography.
- End-to-end encryption does not protect metadata, which includes information like when a file was created, the date when a message is sent and the endpoints between which data was shared.