{"id":5096,"date":"2019-12-05T17:59:53","date_gmt":"2019-12-05T12:29:53","guid":{"rendered":"https:\/\/triumphias.com\/blog\/?p=5096"},"modified":"2019-12-05T17:59:53","modified_gmt":"2019-12-05T12:29:53","slug":"end-to-end-encryption","status":"publish","type":"post","link":"https:\/\/triumphias.com\/blog\/end-to-end-encryption\/","title":{"rendered":"End-to-end encryption"},"content":{"rendered":"<p><strong>Relevance: Mains: G.S Paper III: Science and technology<\/strong><\/p>\n<ul>\n<li>Globally, intelligence and law enforcement agencies are arguing that end-to-end encryption makes it much harder to track terrorists, pedophiles and human traffickers as it makes it nearly impossible for them to get access to people\u2019s digital communications.<\/li>\n<\/ul>\n<p><strong>Working:<\/strong><\/p>\n<ul>\n<li>End-to-end encryption takes place on either end of a communication. A message is encrypted on a sender\u2019s device, sent to the recipient\u2019s device in an unreadable format, then decoded for the recipient.<\/li>\n<li>For doing this, a program on your device mathematically generates two cryptographic keys \u2014 a public key and a private key.<\/li>\n<li>The public key can be shared with anyone who wants to encrypt a message to you. The private key, or secret key, decrypts messages sent to you and never leaves your device.<\/li>\n<\/ul>\n<p><strong>How is it different from other forms of encryption?<\/strong><\/p>\n<ul>\n<li>Transport layer encryption relies on a third party, like a tech company, to encrypt messages as they move across the web.<\/li>\n<li>With this type of encryption, law enforcement and intelligence agencies can get access to encrypted messages by presenting technology companies with a warrant or national security letter. The sender and recipient would not have to know about it.<\/li>\n<li>End-to-end encryption ensures that no one can eavesdrop on the contents of a message while it is in transit. It forces spies or snoops to go directly to the sender or recipient to read the content of the encrypted message.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Relevance: Mains: G.S Paper III: Science and technology Globally, intelligence and law enforcement agencies are arguing that end-to-end encryption makes<\/p>\n","protected":false},"author":1,"featured_media":3522,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[123,42,69],"tags":[392],"class_list":["post-5096","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","category-general-studies-iii-technology-economic-development-bio-diversity-environment-security-and-disaster-management","category-science-and-technology","tag-union-public-service-commission-upsc"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/5096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/comments?post=5096"}],"version-history":[{"count":1,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/5096\/revisions"}],"predecessor-version":[{"id":5097,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/5096\/revisions\/5097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media\/3522"}],"wp:attachment":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media?parent=5096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/categories?post=5096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/tags?post=5096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}