Optimize IAS
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login

End to End Encryption

  • December 12, 2022
  • Posted by: OptimizeIAS Team
  • Category: DPN Topics
No Comments

 

 

End to End Encryption

Subject: Science and Development

Context:

  • Apple, on December 07,2022 announced the introduction of end-to-end encryption for most of the data on iCloud by early 2023.
  • Apple announced that it will be increasing the number of data points protected by end-to-end encryption on iCloud from 14 to 23 categories.
  • The company claimed that with end-to-end encryption, user data will be protected even in case data is breached in the cloud.
  • Similarly, Elon Musk, CEO of Twitter recently pushed for Twitter directing messaging’s (DMs) to be encrypted.
  • Many popular messaging service providers use end-to-end encryption, including Facebook, WhatsApp and Zoom.
  • However, several government agencies are not happy with the recent development..

What is End to End Encryption

  • End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it’s transferred from one end system or device to another.
  • It prevents third parties like cloud service providers, internet service providers (ISPs) and cybercriminals from accessing data while it is being transferred.
  • End-to-end encryption uses an algorithm to convert plain text into an unintelligible format.
  • Exclusively individuals having the decryption keys, which are only kept on endpoints and not with any other parties like service providers, can decode and read this format.
  • When sending corporate documents, financial information, legal documents, and private discussions, end-to-end encryption has long been employed. Additionally, it may be used to manage user authorization for access to stored data.

Significance

  • End-to-end encryption is used to secure communications in instant messaging and also used to secure passwords, protect stored data and safeguard data on cloud storage.
  • Extra layer of protection would be valuable to targets of hacking attacks launched by well-funded groups.
  • End-to-end encryption promotes data protection and prevents unauthorised access to personal data.
  • End-to-end encryption is also viewed as a technology that protects user data from government snooping, making it a desired feature by political opponents, journalists, and activists.

Government agencies standpoint:

  • Attempts by government agencies across the globe, in the past, to access encrypted data hosted and stored by tech companies have met with strong resistance.
  • Encrypted messages can be used by terrorists and other non state elements that can threaten sovereignty and integrity of nation.
  • In 2019, the U. S., the U. K., and Australia planned to pressure Facebook to create a backdoor into its encrypted messaging apps to allow governments to access the contents of private communications.
  • In 2018, Australia passed legislation that would force tech companies and service providers to build capabilities allowing law enforcement secret access to messages on platforms like WhatsApp and Facebook.
  • It becomes more challenging to censor social media trolls, hate speech, and child pornography.
  • End-to-end encryption does not protect metadata, which includes information like when a file was created, the date when a message is sent and the endpoints between which data was shared.
End-to-End Encryption Science and development

Recent Posts

  • Daily Prelims Notes 23 March 2025 March 23, 2025
  • Challenges in Uploading Voting Data March 23, 2025
  • Fertilizers Committee Warns Against Under-Funding of Nutrient Subsidy Schemes March 23, 2025
  • Tavasya: The Fourth Krivak-Class Stealth Frigate Launched March 23, 2025
  • Indo-French Naval Exercise Varuna 2024 March 23, 2025
  • No Mismatch Between Circulating Influenza Strains and Vaccine Strains March 23, 2025
  • South Cascade Glacier March 22, 2025
  • Made-in-India Web Browser March 22, 2025
  • Charting a route for IORA under India’s chairship March 22, 2025
  • Mar-a-Lago Accord and dollar devaluation March 22, 2025

About

If IAS is your destination, begin your journey with Optimize IAS.

Hi There, I am Santosh I have the unique distinction of clearing all 6 UPSC CSE Prelims with huge margins.

I mastered the art of clearing UPSC CSE Prelims and in the process devised an unbeatable strategy to ace Prelims which many students struggle to do.

Contact us

moc.saiezimitpo@tcatnoc

For More Details

Work with Us

Connect With Me

Course Portal
Search