{"id":218033,"date":"2022-12-12T19:33:50","date_gmt":"2022-12-12T14:03:50","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=218033"},"modified":"2022-12-12T19:33:50","modified_gmt":"2022-12-12T14:03:50","slug":"what-is-end-to-end-encryption-and-why-are-tech-companies-focusing-on-it","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/what-is-end-to-end-encryption-and-why-are-tech-companies-focusing-on-it\/","title":{"rendered":"What is end-to-end encryption and why are tech companies focusing on it?"},"content":{"rendered":"\n<p><b>Source:<\/b><span style=\"font-weight: 400;\"> The post is based on the article <\/span><b>\u201cWhat is end-to-end encryption and why are tech companies focusing on it?\u201d <\/b><span style=\"font-weight: 400;\">published in <\/span><b>The Hindu <\/b>on<b> 12th December 2022<\/b><\/p>\n<h5><b>What is the News?<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">A<\/span><span style=\"font-weight: 400;\">pple has announced it will be increasing the number of data points protected by end-to-end encryption on iCloud from 14 to 23 categories.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company claimed that with end-to-end encryption, user data will be protected even in case data is breached in the cloud.<\/span><\/p>\n<h5><b>What is end-to-end encryption?<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">End-to-end encryption is a communication process that encrypts data being shared between two devices. It prevents third parties like cloud service providers, internet service providers (ISPs) and cybercriminals from accessing data while it is being transferred.\u00a0<\/span><\/p>\n<p><b>Process:<\/b><span style=\"font-weight: 400;\"> The process of end-to-end encryption uses an algorithm that transforms standard text into an unreadable format.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 This format can only be unscrambled and read by those with the decryption keys, which are only stored on endpoints and not with any third parties including companies providing the service.<\/span><\/p>\n<p><b>Usage:<\/b><span style=\"font-weight: 400;\"> End-to-end encryption is used to secure communications. Some of the popular instant-messaging apps that use it are Signal, WhatsApp, iMessage, and Google messages.<\/span><\/p>\n<h5><b>Why are tech companies going for end-to-end encryption?<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Apple stated that the total number of data breaches has more than tripled between 2013 and 2021. Hence, it is trying to address this rising threat by implementing end-to-end encryption.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, the focus on end-to-end encryption seems to stem from the company\u2019s desire to position itself as a provider of secure data storage and transfer services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">End-to-end encryption is also seen as a technology that secures users\u2019 data from snooping by government agencies, making it a sought-after feature by activists, journalists, and political opponents.<\/span><\/p>\n<h5><b>Why are government agencies unhappy with end-to-end encryption?<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The FBI in a statement has expressed displeasure at the idea of increasing the use of end-to-end encryption by technology companies.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It said that while it remains a strong advocate of encryption schemes that give \u201clawful access by design\u201d, that would enable tech companies \u201cserved with a legal order\u201d to decrypt data. However, it continues to be deeply concerned with the threat end-to-end and user-only-access encryption pose.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Further in recent times, attempts have been made by governments across the globe to access encrypted data hosted and stored by tech companies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, in 2018 <strong>Australia passed laws<\/strong> that would force tech companies and service providers to build capabilities allowing law enforcement secret access to messages on platforms like WhatsApp and Facebook. This legislation according to government agencies was necessary to prevent \u201cterrorists\u201d and other serious criminals from hiding from the law.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source: The post is based on the article \u201cWhat is end-to-end encryption and why are tech companies focusing on it?\u201d published in The Hindu on 12th December 2022 What is the News? Apple has announced it will be increasing the number of data points protected by end-to-end encryption on iCloud from 14 to 23 categories.\u00a0&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/what-is-end-to-end-encryption-and-why-are-tech-companies-focusing-on-it\/\">Continue reading <span class=\"screen-reader-text\">What is end-to-end encryption and why are tech companies focusing on it?<\/span><\/a><\/p>\n","protected":false},"author":10317,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1566,1738,9],"tags":[10498],"class_list":["post-218033","post","type-post","status-publish","format-standard","hentry","category-daily-factly-articles","category-science-and-technology-daily-factly-articles","category-public","tag-the-hindu","entry"],"jetpack_featured_media_url":"","views":{"total":0,"cached_at":1700806733,"cached_date":1704886245},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/218033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/10317"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=218033"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/218033\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=218033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=218033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=218033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}