In News
- As part of a privacy effort, Apple announced that it will now provide full end-to-end encryption.
More about the End-to-end encryption
- About:
- End-to-end encryption is a communication process that encrypts data being shared between two devices.
- It prevents third parties like cloud service providers, internet service providers (ISPs) and cybercriminals from accessing data while it is being transferred.
- Features:
- The process of end-to-end encryption uses an algorithm that transforms standard text into an unreadable format.
- This format can only be unscrambled and read by those with the decryption keys, which are only stored on endpoints and not with any third parties including companies providing the service.
- Significance:
- End-to-end encryption ensures that user data is protected from unwarranted parties including service providers, cloud storage providers, and companies that handle encrypted data.
- Where is it used?
- End-to-end encryption has long been used when transferring business documents, financial details, legal proceedings, and personal conversations.
- End-to-end encryption today is majorly used to secure communications.
- Some of the popular instant-messaging apps that use it are Signal, WhatsApp, iMessage, and Google messages.
- It is also used to secure passwords, protect stored data and safeguard data on cloud storage.
- Shortcomings:
- However, end-to-end encryption does not protect metadata, which includes information like when a file was created, the date when a message is sent and the endpoints between which data was shared.
- Cryptographers and cybersecurity experts argue that attempts by law enforcement to weaken encryption with backdoors are ill-advised and could compromise the reliability of the internet.
Source: TH
Previous article
Distorted use of fertilisers
Next article
T-cell Acute Lymphoblastic Leukaemia (T-ALL)