Test
Students For Liberty is the largest pro-liberty student organization in the world.
To get started, please select your region on the map.

Digital Privacy

Why you should encrypt your digital activity, and how to do it

By

By Kenny Tan

Anyone who uses the internet should consider using strong encryption to safeguard personal information and private communications.

Why? Consider the extent of NSA surveillance that was highlighted in the mid 2010s. Almost all telecommunications (e.g. email, social networks, voice calls) operate through central service providers that store records of all user activity. As a result, the Feds can easily access that data without a warrant by requesting it through a Foreign Intelligence Surveillance Act (FISA) request or National Security Letter (NSL).

Centralized data storage means you are always at risk

But what if someone has nothing to hide from the government? The NSA’s strategy of massive data mining and indefinite storage in centralized data centers still leaves many areas for concern. A concentration of sensitive information is a treasure-trove for malicious hackers.

Even if the government thwarts all external attacks, consider how much data was available to leakers like Chelsea Manning and Edward Snowden. As Snowden admitted in his interview with Glenn Greenwald, it would have been quite lucrative for him to sell data to foreign intelligence agencies.

It’s not hard to imagine far less honorable government employees abusing their power for criminal gain. If the government cannot protect its own secrets, why trust it to protect yours?

How does encryption work?

First, an encryption algorithm takes two inputs, the data to be encrypted and usually an encryption key. The algorithm then applies its complex series of mathematical operations, potentially altered by the key, to the data. The output will be unreadable text. Encrypted data is similarly decrypted using a decryption algorithm and a decryption key.

To offer an example, we’ll examine Bitmessage, a peer-to-peer communications protocol. Bitmessage allows users to send and receive encrypted messages. Think of it as a substitute for email. Instead of email addresses and passwords, users can generate 36 character addresses along with public keys (encryption keys) and private keys (decryption keys). Bitmessage, similar to Bitcoin, runs on a decentralized distributed network, meaning that messages do not run through a central server.

Instead, each user’s client/software forms incoming and outgoing connections with a limited number of random clients. New messages are forwarded throughout the network, thus distributing all messages to all users running the software. Users do not know the intended recipient of messages.

Instead, each user’s client will attempt to decrypt each message using previously generated private keys; if it is successful then the message was meant for that user. As a result, Bitmessage hides the identity of the original sender and recipient. This feature can be especially useful considering that the National Security Agency is collecting vast amounts of metadata from Verizon. Analysis of metadata, or non-content data, can reveal much more than the content itself.

It’s easy to encrypt your communications

Tools such as Bitmessage could become much more popular in the near future. In the past, technical expertise has posed barriers for wide adoption of encryption technology. However, the growing threat of government surveillance and recent advances in hardware and software could make wide adoption more likely.

Like Bitcoin, websites could be developed to integrate Bitmessage and provide interesting statistics about the network while mobile applications and QR codes could reduce the effort required in dealing with 36 character long addresses. A detailed guide to installing and using Bitmessage can be found here.

Of course Bitmessage is not the only encryption application you can use. There are many useful tools for anonymous internet browsing, sending encrypted chat, securing phone calls, and thwarting cell phone tracking. In the future, encryption could become mainstream, with governments racing to catch up with ever-faster supercomputers.

To read more about digital privacy, be sure to check out our cluster page by clicking on the button below.



Updated by Joseph Simnett

This piece solely expresses the opinion of the author and not necessarily the organization as a whole. Students For Liberty is committed to facilitating a broad dialogue for liberty, representing a variety of opinions. If you’re a student interested in presenting your perspective on this blog, send your piece to [email protected], and mention SFL Blog in the email subject line for your chance to be published and be seen!

Write for Us

Our Writers

X