{"id":24504,"date":"2014-07-03T11:41:10","date_gmt":"2014-07-03T15:41:10","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24504"},"modified":"2014-07-03T11:41:10","modified_gmt":"2014-07-03T15:41:10","slug":"the-ultra-simple-app-that-lets-anyone-encrypt-anything","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/the-ultra-simple-app-that-lets-anyone-encrypt-anything.php","title":{"rendered":"The Ultra-Simple App That Lets Anyone Encrypt Anything"},"content":{"rendered":"<p><p>      Original illustration:      Getty    <\/p>\n<p>    Encryption is hard. When NSA    leaker Edward Snowden wanted to communicate with journalist    Glenn Greenwald via encrypted email, Greenwald couldnt figure    out the venerable crypto program PGP even after Snowden made    a 12-minute tutorial    video.  <\/p>\n<p>    Nadim Kobeissi wants to bulldoze    that steep learning curve. At the HOPE hacker conference in New York    later this month hell release a beta version of an all-purpose    file encryption program called miniLock, a free and open-source    browser plugin designed to let even Luddites encrypt and    decrypt files with practically uncrackable cryptographic    protection in seconds.  <\/p>\n<p>    The tagline is that this is file    encryption that does more with less, says Kobeissi, a 23-year    old coder, activist and security consultant. Its super    simple, approachable, and its almost impossible to be confused    using it.  <\/p>\n<p>      A screenshot from an early demo      of miniLock.    <\/p>\n<p>    Kobeissis creation, which he says    is in an experimental phase and shouldnt yet be used for high    security files, may in fact be the easiest encryption software    of its kind. In an early version of the Google Chrome plugin    tested by WIRED, we were able to drag and drop a file into the    program in seconds, scrambling the data such that no one but    the intended recipientin theory not even law enforcement or    intelligence agenciescould unscramble and read it. MiniLock    can be used to encrypt anything from video email attachments to    photos stored on a USB drive, or to encrypt files for secure    storage on Dropbox or Google Drive.  <\/p>\n<p>    Like the older PGP, miniLock    offers so-called public key encryption. In public key    encryption systems, users have two cryptographic keys, a public    key and a private one. They share the public key with anyone    who wants to securely send them files; anything encrypted with    that public key can only be decrypted with their private key,    which the user guards closely.  <\/p>\n<p>    Kobeissis version of public key    encryption hides nearly all of that complexity. Theres no need    to even register or log inevery time miniLock launches, the    user enters only a passphrase, though miniLock requires a    strong one with as many as 30 characters or a lot of symbols    and numbers. From that passphrase, the program derives a public    key, which it calls a miniLock ID, and a private key, which the    user never sees and is erased when the program closes. Both are    the same every time the user enters the passphrase. That    trick of generating the same keys again in every session means    anyone can use the program on any computer without worrying    about safely storing or moving a sensitive private key.  <\/p>\n<p>    No logins, and no private keys to    manage. Both are eliminated. Thats whats special, says    Kobeissi. Users can have their identity for sending and    receiving files on any computer that has miniLock installed,    without needing to have an account like a web service does, and    without needing to manage key files like PGP.  <\/p>\n<p>    In fact, miniLock uses a flavor of    encryption that had barely been developed when PGP became    popular in the 1990s: elliptic curve cryptography. Kobeissi    says that crypto toolset allows for tricks that havent been    possible before; PGPs public keys, which users have to share    with anyone who wants to send them encrypted files, often fill    close to a page with random text. MiniLock IDs are only 44    characters, small enough that they can fit in a tweet with room    to spare. And elliptic curve crypto makes possible miniLocks    feature of deriving the users keys from his or her passphrase    every time its entered rather than storing them. Kobeissi says    hes saving the full technical explanation of miniLocks    elliptic curve feats for his HOPE conference    talk.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661467\/s\/3c222c25\/sc\/5\/l\/0L0Swired0N0C20A140C0A70Cminilock0Esimple0Eencryption0C\/story01.htm\/RK=0\/RS=FA2KY3GxOZLq5l_45dt8ToGpPbY-\" title=\"The Ultra-Simple App That Lets Anyone Encrypt Anything\">The Ultra-Simple App That Lets Anyone Encrypt Anything<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Original illustration: Getty Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldnt figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24504","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24504"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24504"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24504\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}