Encryption Principles: What everyone should know

9:03 PM
Encryption Principles: What everyone should know -

Encryption Fundamentals

Encryption is an essential tool and a fundamental right. It should be easy to use and available to the entire population, and should not contain backdoors. Golden Frog strongly advocates for encryption, and we have defined four key principles of encryption below.

1. Privacy is a right and encryption is the right to defend yourself

Tim Cook said Apple's famous "Privacy is a right" and we agree. Everyone has the right to privacy - both on and offline. Taking this concept further, we believe that if privacy is a right then Encryption is the second amendment to the Internet. Encryption is your ability to protect and defend you online. Golden Frog offers tools to ensure such protection, and we are incorporated in Switzerland, where privacy is a fundamental constitutional right.

2. Encryption must be easy to use

Encryption should be easy to use and accessible to everyone - not just the technical elite. It should be enabled by default rather than a particular feature, and should be activated on a user device. Think the days of dial-up, when users had to complete several manual steps to connect to the Internet. Technology has advanced far to make the Internet more accessible for everyone, and this should also be the case for encryption. The technology certainly exists, and we have built in VyprVPN. Our users simply connect and press the connect button - it's easy

3. Encryption must be omnipresent and undetectable

Encryption should function as a utility, such as water or electricity pipe. Ubiquity can be obtained by encryption available to everyone as part of a standard service, as opposed to an additional "add on". If availability is widespread, there will be mass adoption of encryption. When we move towards mass adoption, it will be more difficult for governments to detect or identify that uses encryption.

But the widespread adoption of encryption is not enough. Encryption should be undetectable, and we need the technology community to work in this direction. As Edward Snowden explained at SXSW 2015 VPN providers must develop new technologies to hide their services to VPN traffic can not be identified as being encrypted. He also affirmed the need for greater efforts to randomization to the other services that we, as a community of technology can overcome monitoring at the network level. These suggestions were encouraging as Golden Frog has already built our own VPN technology called Chameleon that blurs OpenVPN packet metadata to ensure it is not recognized as a VPN connection. Chameleon allows people all over the world, especially China, to defeat the tactics of deep packet inspection and other network monitoring efforts.

4. No encryption backdoors

There is an ongoing debate in the US as the government and other officials to push backdoors in encrypted communications . This initiative is not only wrong, but also represents a serious threat to consumer privacy and corporate security and an obstacle to technological innovation. Fortunately, history is on our side. Backdoors were beaten during Crypto wars of the 190s, and this helped to create the modern Internet. Today, we all use encryption in our daily lives, often without knowing it. Encryption is used to facilitate transactions online retail, banking online, social media and other online communications. Companies rely on encryption to secure their communications and sensitive financial information, protect trade secrets and to provide reliable services to their clients. We are strongly opposed to encryption backdoor, and have outlined several arguments against-the backdoor encryption issue.

Previous
Next Post »
0 Komentar