by James Heppell
End-to-end encryption is probably a term you’ve come across before, but perhaps not one you’re that familiar with. Nowadays, when data is sent over the internet, it’s almost always encrypted beforehand. This scrambles the data into seemingly random combinations of characters, using an encryption key. With the matching decryption key however, the data can be unscrambled back into its original form. This means that private information is kept private; nobody who intercepts and reads the transmission is able to make sense of it. And with the number of possibilities that the standard 256 bit encryption entails, using brute force to unscramble the data (that is, to try out every combination of decryption keys to find the right one) using current computers would take ~200000000000000000000000x as long as the universe has existed1. As computers continue to become more powerful, and especially as quantum computing begins to really take off, perhaps our current encryption algorithms will become breakable. But for the time being, encryption simply cannot be broken.
Standard encryption involves the data being sent between you and an app’s servers being encrypted. Once the data arrives at the servers, it’s decrypted. For most uses, this makes sense. You want your banking website to be about to read your bank details. But sometimes, the data you're sending is not intended for the app you’re using, but for another person that you're communicating with. Using standard encryption, these messages or calls are decrypted by the server of whatever messaging platform you’re using, and then re-encrypted before being sent to the recipient, meaning that an app can read your messages and listen in on your calls if they so choose. Enter end-to-end encryption (E2EE). Using E2EE means that only you and the recipient(s) have a copy of the decryption key, meaning data remains encrypted as it passes through servers and can only be decrypted once it arrives at its destination.
On the surface of it, E2EE seems great! Nobody except you and your friend(s) can read your messages and stream your calls. Even if the messaging platform experiences a data leak, 3rd parties will only be able to view encrypted meaningless data. However, E2EE isn’t without its drawbacks. From a technical perspective, it’s harder to implement. Say I want to message you from my laptop instead of my phone, I can’t simply log into my messaging app and open up all my messages, because they’re encrypted and the messaging app doesn’t know the decryption key. I’d have to first link it to my phone by scanning a QR code or similar.2 After that, they’ll stay linked, but if my decryption key changes for whatever reason (e.g. I get a new phone), then I’ll have to redo the process. Another problem is if you lose or break your phone. If you’ve backed up your messages using E2EE, you won’t be able to view them on a new phone without having the old phone on hand to set it up. Additionally, calling is also more complicated - see 3.
Still, while more complicated, E2EE can be used in place of standard encryption, and already is in many products. WhatsApp, iMessage, RCS4, and Signal are some of the most well known to use it5. What I find to be the more interesting debate is the ethical one. As much as I prefer not to have all my messages stored on social media companies servers for them to do what they like with, sometimes, them being able to view your messages and calls can be a good thing. If you were to do something that breaks the rules of a social media platform, it makes sense that the platform should be able to investigate this and subsequently ban you from the platform. But more so than breaking the rules, what if you were to do something illegal, such as child pornography/grooming or planning and organising a crime that is later carried out. Surely a police investigation should be able to have access to messages if it were needed to help them in their investigation, right? I would argue that in a lot of cases, it would still be possible to do this under E2EE. Say I were to report someone on a platform, for breaking platform rules or doing something illegal, when I hit the report button, it could send a copy of my message history with that person to the social media platform or police agency, using the messages that have already been decrypted onto my device. However, in the case of planning, where no member of the group is going to be offering themselves up to be reported, E2EE prevents platforms and police from being able to do anything without physical access to the devices, whereas they might under standard encryption. Yet at the same time, governments having access to people’s messages can be a terrible thing. In so many countries in the world still, things such as speaking out against the government, being gay or following/not following a certain religion are considered crimes. In countries such as these, E2EE could be the difference between life and death for someone who, from a Western viewpoint, hasn’t done anything wrong. It could be a way of organising protest against and ultimately bringing down inmoral regimes. And that’s just the thing with end-to-end encryption, it can be simultaneously used for good and for bad. It really boils down to: should privacy be a fundamental human right, something that not even governments can take away from people?
1https://www.ubiqsecurity.com/128bit-or-256bit-encryption-which-to-use/
2It seems to me that it should be possible to store your encryption/decryption keys somewhere, such as a password manager, and manually enter them without having your phone on hand, but as far as I’m aware there aren’t any services that let you do this.
3https://signal.org/blog/how-to-build-encrypted-group-calls/
4RCS is a newer version of SMS that acts more like a modern messaging platform. It’s only fully supported in the Google Messages app, and not in Apple Messages at all.
5These 4 platforms exclusively use E2EE. Other platforms like Telegram and Facebook Messenger allow you to create ‘secret chats’ using E2EE but don’t use it by default.
Comments
Post a Comment
Comments with names are more likely to be published.