{"id":11204,"date":"2014-03-20T02:41:24","date_gmt":"2014-03-20T06:41:24","guid":{"rendered":"http:\/\/www.opensource.im\/?p=11204"},"modified":"2014-03-20T02:41:24","modified_gmt":"2014-03-20T06:41:24","slug":"facebook-holds-back-on-end-to-end-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/facebook-holds-back-on-end-to-end-encryption.php","title":{"rendered":"Facebook holds back on end-to-end encryption"},"content":{"rendered":"<p><p>    News  <\/p>\n<p>    By Zach Miners  <\/p>\n<p>    March 19, 2014 05:58 AM ET  <\/p>\n<p>    IDG News Service - If you're a    Facebook user and you want the best form of encryption to keep    hackers and spies out of your posts and chats, you don't have a    ton of options now.  <\/p>\n<p>    Facebook has gradually amped up its security protocols and    encryption methods over the years. This includes its \"bug    bounty\" program that pays outsiders to uncover security holes,    as well as HTTPS encryption, which encrypts people's    communications in transit but still decrypts it at data centers    before re-encrypting it.  <\/p>\n<p>    However, end-to-end encryption, which holds promise as the best    way to secure users' posts, is not in any of Facebook's major    products by default. The technology is meant to encrypt    people's communications at their client devices so that    governments and others must target the person and not    Facebook's data centers.  <\/p>\n<p>    Facebook has been able to deploy end-to-end encryption for a    long time, Chief Security Officer Joe Sullivan said on Tuesday.    It hasn't rolled the technology out across its services partly    due to its complexity. The company has also held back because,    when end-to-end encryption is done right, it's hard for the    average person to communicate, he said.  <\/p>\n<p>    \"If you use end-to-end encryption on email, you realize how    hard it can be,\" Sullivan said during a talk with the press at    Facebook's headquarters in Menlo Park, California. End-to-end    encryption can be hard for people to use and understand because    it typically requires a manual process of exchanging public    keys between the sender and receiver whenever they send an    email or any other type of message.  <\/p>\n<\/p>\n<p>    If Facebook users want that type of security, there are some    third-party apps they can use to add end-to-end encryption to    Facebook's services, Sullivan said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com\/s\/article\/9247046\/Facebook_holds_back_on_end_to_end_encryption\/RS=^ADAo2qmW0hHEoEJWTxFhZNQsti3CQ8-\" title=\"Facebook holds back on end-to-end encryption\">Facebook holds back on end-to-end encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> News By Zach Miners March 19, 2014 05:58 AM ET IDG News Service - If you're a Facebook user and you want the best form of encryption to keep hackers and spies out of your posts and chats, you don't have a ton of options now. Facebook has gradually amped up its security protocols and encryption methods over the years. This includes its \"bug bounty\" program that pays outsiders to uncover security holes, as well as HTTPS encryption, which encrypts people's communications in transit but still decrypts it at data centers before re-encrypting it. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-11204","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/11204"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=11204"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/11204\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=11204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=11204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=11204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}