Tuesday, March 7, 2017

Why End-to-End Encryption is So Important

Some of you may have read about the Wikileaks hack today (3/7).  But OF ALL THE revelations to come out of the 9,000-page data dump of CIA hacking tools, one of the most explosive is the possibility that the spy agency can compromise Signal, WhatsApp, and other encrypted chat apps. If you use those apps, let’s be perfectly clear: Nothing in the WikiLeaks docs says the CIA can do that.

Here is a great video explaining why end-to-end is so important these days.  (Click on the link; after ad is a video explaining end-to-end).  It's rather predictive of things to come.  But some important end-to-end tools - some of which you may already know about, but others may want you to consider.

Which leads to another recent and interesting piece of news related to encryption the media is using.  "How The Media Are Using Encryption Tools To Collect Anonymous Tips".
Like the video (above - please watch it), the article points out that there there is a renewed interest in leaks since Donald Trump's surprise election victory last fall, and a growth in the use of end-to-end encryption technology, have led news organizations across the country to highlight the multiple high-tech ways you can now send them anonymous tips.

The Washington Post, The New York Times and ProPublica have launched webpages outlining all the ways you can leak to them. ProPublica highlights three high-tech options on its page (in addition tthe Postal Service): the encrypted messaging app Signal, an encrypted email program called PGP (or GPG) and an anonymous file sharing system for desktop computers called SecureDrop. The Washington Post goes even further, highlighting six digital options.  Check this out!

Commenting is encouraged.  If you have nothing to say about this, you probably don't care who can hack your phone, or your laptop, or your text messages.  Just keep doing what you're doing.  Why should you worry?  You've done nothing wrong.


7 comments:

  1. I read that some of the hacking materials the CIA used were able to turn your phone into a recording device in order to spy on you. That includes Iphones, Androids and Smart TV's. Will be interesting if Apple, Google and Microsoft make an adjustments to their phones to avoid this from happening.

    ReplyDelete
    Replies
    1. I also saw this, but also saw a representative from Apple said that most of those vulnerabilities have been patched it the most recent updates, and potentially only affected devices running iOS 9.3 and earlier (currently on iOS 10.2.1).

      Delete
  2. With the issues of technological privacy becoming increasingly more relevant to 'average' citizens (I, by the way, fall into that category), I find it to be extremely important for outlets like WIRED to prioritize content that informs us general public about both what the government and its entities are doing, and what we can do to further anonymize ourselves.

    ReplyDelete
    Replies
    1. Wired is just one source. They have an agenda, too. I tend to follow EFF, and other wonky tech journals, as well as investigative journalism.

      Delete
  3. It is true that stories like those are scary and we are right to be concern about our online privacy. But biggest threat to leak our information, however, mostly come from our often ignored bad habits. Small things like leaving your phone behind people watching it, not setting PIN for the apps that contain sensitive information or even the phone itself, sharing your WIFI password with ones you don’t really know and ignoring the privacy information from Google and Apple, etc.. More than often those bad habits can be more damaging than CIA or FBI cyber-experts.

    ReplyDelete
  4. While it can be scary to some that the government is "spying," it is important to realize that this is for our safety. I always live by the motto, "They can spy all they want, I have nothing to hide." I think the average American has nothing to hide and therefore should not be offended if someone is watching. The CIA is here to protect.

    Concerning companies like Apple or AT&T spying or selling user information, I do not agree with this practice but again it is your job to make sure you are discrete with how you use these devices. If there is a note with information you don't wont AT&T to sell, then write it on a sheet a paper so there is no digital trial . Same thing with Apple, stay away from iCloud.

    You are only as vulnerable as the information you provide.

    ReplyDelete
    Replies
    1. This motto just ignores the fact that they can find things you would not like published about you. Or that they can sell your data to those who will figure out who you are without knowing you. Having an identity and privacy outside the realm of people watching you is what we call living in a democracy. I take you haven't watched Citizen Four or the Snowden movie.

      Did you just say, "stay away from the iCloud?" Like it's Apple who is the only one on the cloud? Don't buy from Amazon or search on Google. They watch your every move and admit it in their policies. So there's that.

      Delete