The increasing amount of data were all generating is everywhere: in smartphones, laptops, thumb drives, and dozens of online services. How can we secure all of them against unwarranted access?
We virtually cant.
Smartphones get stolen, thumb drives get lost, email passwords get brute-forced, cloud servers get breached, unwary users get phished, WiFi networks get tapped, and eventually, malicious users obtain access to your data.
So how do you protect your data against unwelcome parties?
You encrypt it. In case you dont know it, encryption is the science of modifying data to prevent intruders from making sense of it. When you encrypt your data, only you and anyone else holding the decryption keys will be able to unlock and read it. This means that even if an attacker gains access to your data by breaking into a server or stealing your hard drive, they wont be able to make sense of it if they dont have the keys.
As Ive argued before, encryption is your last line of defense, the one thing that can protect your data when all else goes wrong.
So without further ado, heres are some of the key ways you can encrypt the data that youre scattering everywhere.
Email has become a de facto medium for exchanges of all sorts. We use email to send business secrets, financial data, personal data and various kinds of sensitive information. There are few things that are as damaging as a hacked email account.
You should obviously do everything you can to protect your email accounts, such as choosing strong passwords or enabling two-factor authentication. But in case your account does get breached, you have a few viable options to encrypt your messages and prevent hackers from actually seeing the contents of your messages.
One is the use of Pretty Good Privacy (PGP), a tool that adds a layer of encryption to your emails. Basically, PGP generates a public and private encryption key and ties it to your email address. You publish the public key for everyone to see and keep the private key to yourself.
Anyone who wants to send you a confidential message will encrypt it with your public key before sending it to you. Only your private key will be able to decrypt the message, and as long as you keep it safe, you can rest assured that only you will be able to read those messages. This means that even the owner of the server where your emails are stored wont be able to read them.
There are a handful of free PGP tools such as Mailvelope, which work with all major webmail clients such as Gmail and Hotmail, and will get you started with encryption in a couple of easy steps.
Of course, if you want your outgoing messages to be encrypted as well, the recipient needs to have a PGP key too, so youll have to convince your friends to set up PGP accounts.
An alternative to PGP is using an end-to-end encrypted mail service such as ProtonMail or LavaBit. End-to-end encryption makes sure that anything that gets stored in your account is only viewable by you, the person who holds the key. No surveillance or massive databreach will give access to the content of your emails.
The same threats that can out your emails apply to the files you store in cloud services such as Google Drive and Dropbox. Even the biggest services you entrust with your files can get hacked, and the sensitive files youve stored in the cloud can fall into the wrong hands.
The most basic choice is to protect your files with a compression tool that supports encryption and password protection features, like zip, before storing them in your cloud server.
In case you find it too cumbersome to manually encrypt and decrypt your files, you can use tools such as Boxcryptor or Whisply, which integrate with most popular cloud services and add an easy-to-use layer of encryption.
Another alternative is to use an encrypted storage service such as SpiderOak One, Tresorit or Cryptobox, which have end-to-end encryption incorporated into their service. This means only you and whomever you share your files with will have access to the contents.
Messaging apps are perhaps the most popular applications we use on our phones. But theyre not all equally secure. Some applications will encrypt your messages in transition, but not in storage, which means your data can become exposed in case of data breaches or compromised accounts.
The most secure messaging apps are those that have end-to-end encryption features, making messages exclusively visible to the parties taking part in a conversation. Weve discussed how to evaluate messaging apps in terms of security here on The Next Web before.
Some of the viable options include Open Whisper Systems Signal, WhatsApp and Wickr, which are end-to-end encrypted by default. Telegram and Facebook Messenger also have end-to-end encryption, though youll have to enable them manually.
You might also want check out this interesting project by two Canadian students, who are working to add strong encryption to a variety of web communication tools.
While you consider the security of your online data, you shouldnt forget about the devices you physically own. Your phone, laptop, memory cards and flash drives hold quite a lot of sensitive information.
Your smartphone in particular is very vulnerable. It has a lot of functionality, it holds your communication apps and sensitive information and pictures, among others. And you carry it everywhere with you, which means theres a greater chance you might lose it or get it stolen from you.
Fortunately, most desktop and mobile operating systems support full-disk encryption, a feature that will encrypt everything on your phone, computer or flash drive. By enabling full-disk encryption, youll protect your on-device data against physical theft. Good encryption cant be circumvented, even by device manufacturers or government agenciesat least not without spending a huge bunch of money.
Credit: Juan Buis / TNW
In iOS version 8 and later, device encryption is turned on by default if your device has a passcode. Newer Android devices also come with device encryption enabled out of the box, but with the variety of devices available out there, you might want to verify to make sure yours is encrypted.
For your laptops and removable media, depending on which operating system you have, there are always good encryption tools available. Windows has BitLocker, which can easily encrypt your hard drives or removable storage in a few easy clicks. The Mac OS has a native encryption tool as well, called FileVault.
Hackers have many ways to steal your information on the fly, especially if youre using a public WiFi network. In fact, your internet service provider too might be interested in having a look at your internet traffic.
Adding a layer of encryption to your internet traffic will make sure you enjoy full privacy while surfing the web. One of your viable options is to use a Virtual Private Network (VPN). VPN services encrypt all your traffic and redirect them through their own servers. All eavesdroppers will be able to see is a bunch on encrypted data being exchanged between you and your VPN service.
VPN services are available for both mobile devices and desktop computers.
To be fair, VPN is not a perfect solution. Your VPN provider will have full visibility over your non-HTTPS traffic. Free VPN services in particular have a tendency to use customer data for commercial purposes. But its much safer than letting hackers scrutinize your traffic.
Encryption is not a complete security solution and it doesnt obviate the need for basic security measures such as keeping your operating system and software up to date with the latest security patches. And dont forget that encryption is only as secure as you make it, which means you have to keep your keys secure.
But encryption is definitely one of your best friends in the hostile world of digital information, connected devices and online services. Encrypt your data, and stay safe out there.
Read next: 8 reasons why Berlin will outpace London as Europes Silicon Valley
Originally posted here:
You need to encrypt all your data. This is how it's done - TNW
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]