{"id":55466,"date":"2023-10-16T19:56:40","date_gmt":"2023-10-16T23:56:40","guid":{"rendered":"https:\/\/euvolution.com\/open-source-convergence\/uncategorized\/what-is-encryption-internet-society.php"},"modified":"2023-10-16T19:56:40","modified_gmt":"2023-10-16T23:56:40","slug":"what-is-encryption-internet-society","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/what-is-encryption-internet-society.php","title":{"rendered":"What Is Encryption? &#8211; Internet Society"},"content":{"rendered":"<p><p>      Personal security:      Encryption backdoors can be opened by anyone who finds them,      including cyber criminals  who will work overtime to find      and exploit them  with devastating consequences for the      personal security of billions of people, including:    <\/p>\n<p>     Compromised personal privacy and security:    End-to-end encrypted communications protect the identity of    journalists, activists, protected witnesses, undercover police,    and many others who rely on secure and confidential    communications. Vulnerable communications put these people at    risk.  <\/p>\n<p>     Putting vulnerable populations at risk:    End-to-end encryption has helped protect vulnerable    individuals, including victims of abuse    and LGBTQ+ people who    use encryption to communicate confidentially and to seek help    without fear of retribution. Victim advocates    use encryption to confidentially discuss relocation plans with    survivors of domestic abuse.  <\/p>\n<p>     Jeopardizing banking and financial    information: By weakening encryption, personal banking    information, credit card data, and other sensitive financial    information is easier for cyber criminals to access and    exploit.  <\/p>\n<p>     Compromising the private identities of billions of    people: Weakening encryption exposes information like    health records, personal identification data, and other    important data that makes it easier for cyber criminals to    steal the identities of billions of people.  <\/p>\n<p>      National security:Encryption      backdoors could create new opportunities for bad actors,      including hostile governments, terrorist organizations, and      international crime rings, to access and exploit government      officials confidential communications, and penetrate and      attack confidential computer systems and databases. This      could cause wide-scale, systemic disruptions to economies,      infrastructure, and national security including:    <\/p>\n<p>     Compromising government data: Government    breaches are frequent, such as the colossal breaches at the    United States Office    of Personnel Management, the Indian governments Aadhaar    database, and the     sensitive information of European Union elected officials.    Authorities arent able to keep encryption backdoors safe from    hackers and criminals, putting confidential data and critical    infrastructure like banks and the power grid at risk.  <\/p>\n<p>     Undermining financial and economic security:    By making personal information and bank data less secure,    encryption backdoors could unintentionally facilitate identity    theft and financial fraud with devastating consequences for    individuals, businesses, and the nations economic stability.  <\/p>\n<p>     Jeopardizing life-sustaining infrastructure:    Introducing vulnerabilities into critical infrastructure    systems like electrical power grids via the secure    communications systems used by its operators could allow bad    actors to hijack the grid and deny power to thousands, leading    to widespread public fear, economic harm, physical injury, and    even deaths. Other critical public services that rely on    encryption to keep citizens safe include elections, hospitals,    and transportation.  <\/p>\n<p>     Compromising military operations: Encryption    supports important government entities that rely on encryption    to safeguard nation states.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.internetsociety.org\/issues\/encryption\/what-is\/\" title=\"What Is Encryption? - Internet Society\" rel=\"noopener\">What Is Encryption? - Internet Society<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Personal security: Encryption backdoors can be opened by anyone who finds them, including cyber criminals who will work overtime to find and exploit them with devastating consequences for the personal security of billions of people, including: Compromised personal privacy and security: End-to-end encrypted communications protect the identity of journalists, activists, protected witnesses, undercover police, and many others who rely on secure and confidential communications. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-55466","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/55466"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=55466"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/55466\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=55466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=55466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=55466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}