Encryption is basically using a code to hide your data. For example, when you were young, you may have used a hidden language to pass notes to your friends in class. Maybe A=1, B=2, etc. Or maybe you even drew your own unique symbols. Those are, technically, a type of encryption. Weak encryption, but still encryption nonetheless. More modern encryption protocols, like Signal and AES are significantly more advanced but at it’s root, the concept is the same: we’re replacing easily understood words with complex substitutes and – in a perfect world – you can only figure out how to turn them back into the easily understood words with a “key,” which explains the code. In the grade school example I gave earlier, the “key” is knowing that A=1, B=2, and so forth. In more advanced software encryption, the key is your password or passphrase. This is, of course, a tremendously high-level overview that dramatically oversimplifies things, but it gets the basic point across.

Encryption is a central concept in this section and privacy in general, specifically what’s called “End-to-End Encryption” or “E2EE” (also sometimes called zero-knowledge). Technically a majority of the internet is encrypted when using HTTPS. Additionally, most services and websites offer at least a basic level of encryption when it comes to things like saving passwords, credit card information, and even sending messages. The thing is, those types of encryption only work against outsiders. Facebook messages, for example, are encrypted to anyone outside of Facebook. Google can’t read them, the random hacker can’t read them, but Facebook employees can read them as if you sent it to them. E2EE defeats this. E2EE messages can ONLY be read by you and the recipient, provided you used the service correctly. Even the provider can’t read them. For example, if both you and the recipient are using ProtonMail to email each other, Proton can’t read your emails.

Encryption, however, is not limited simply to your communications. Encryption can be used on your various devices to protect them when not in use. I briefly mentioned encrypting your mobile devices in the last section, but in this section I'll talk more about encrypting your other devices.

Previous Next