What is encryption and why do I need it?

Outsmart Big Brother™
7 min readMar 13, 2021
https://www.thinkspot.com/online_content/DaurkZ/detail?category=Event&redirected=&time=NaN

Topic Intro

Imagine you and your friends are planning a protest, but you fear that if the local authorities find out ahead of time, they might try to stop you. How do you prevent the authorities from discovering what your plans are?

Your friends live too far away from each other for you to hold an in-person meeting, and the COVID-19 lockdowns also make such physical meetings illegal. You have to send messages to each other, but you suspect the police are monitoring your Internet connections and your phone conversations.

How can you and your friends communicate privately so that your protest is successful?

Find out how in this video.

Brief summary of subject matter and use cases.

In order to send private messages to your friends, you need to master the art of making the meaningful turn into the nonsensical and making the nonsensical turn back into the meaningful.

No, I’m not talking about philosophy.

I’m talking about cryptography.

When you encrypt a message, it means you take a message that looks like this…

Hey everyone,

Let’s have a protest in front of the Liberpolis capitol building at noon on Jefferson’s birthday.

Wear your uniforms and bring your signs.

Let’s make sure our lawmakers know that we care a lot about this issue!

— Jonathan

…and turn it into a message that looks like this!

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

That encrypted message (cyphertext) can then be sent over the Internet to your friends.

If law enforcement were to intercept your message, they would then see the cyphertext, not your actual message. Depending on how complicated your encryption mechanism is, they could try to decrypt it by having their computers do a bunch of guessing (brute force), but to do so would probably be extremely hard for them, if not practically impossible, since there is an astronomical number of possible ways to decrypt it, with only one of them being correct.

So your message is now supposedly safe from being deciphered by the authorities, but how can your friends understand it?

Depending on the encryption scheme you are using, each of your friends could need a “key” sent from you in order to decrypt it, or they could be able to decrypt it with a “private key” which they and they alone already have. It gets kind of complicated, but from all indications, it works.

Therefore, because you and your friends used the power of encryption, you were able to keep your plans a secret and hold the protest as planned. Well done!

Why encryption is important

Encryption enables multiple parties to communicate without eavesdroppers understanding what they are saying to each other. It is almost like two people speaking to each other in a completely unique language in the presence of a crowd who is ignorant of that language.

This makes encryption extremely useful, especially for those who want to Outsmart Big Brother.

If you are an everyday citizen in a reasonably free country, encryption hopefully is used to keep your financial, medical, and other private information safe from malicious hackers (“crackers”). You could also use encryption for random stuff that you simply believe is “nobody else’s business,” like that ancient photo of 2-year-old you picking your nose.

On the other hand, if you are a whistleblower, activist, or a journalist living under an authoritarian regime, encryption could literally mean the difference between life and death.

Everyone who wants to defend freedom must understand at least a little bit of the importance of encryption and how to use it. Even if your country is relatively free and politically stable for now, you never know when the need for encryption could arise.

How to encrypt

Here are some examples of how to use encryption in your everyday life.

Use https:// to encrypt your usernames, passwords, and other info exchanged between you and a website. The “s” in “https” is especially important here. Often, when you are using https, your browser will let you know by showing a little lock icon near the address bar. One time I was trying to login to a WordPress-based website and realized that I had submitted my username and password into it while not being protected by https. I was in http. Since I knew that a hacker could have been monitoring my Internet traffic, I decided to immediately switch to https and change my password.

Use a Virtual Private Network (VPN) to mask your IP address. A VPN basically means that another computer that is far away from you interacts with the Internet on your computer’s behalf and sends encrypted data back and forth. It can help make you anonymous online. But beware, many traditional institutions (like banks) will assume you are a malicious hacker if you try to login while connected using a VPN. You will also be required to complete more annoying CAPTCHAs, since many sites care more about protecting themselves against DDoS attacks (a type of hack attack using many computers to overwhelm a website with requests) than about being privacy-friendly.

Switch to an end-to-end encrypted (E2EE) email provider. I personally use both ProtonMail and Tutanota and I consider them both to be excellent choices. ProtonMail is based in Switzerland; Tutanota is based in Germany. Both offer a free version and premium features (like custom domains) for those who are willing to pay. Both are encrypted. Both are outside the U.S. (LavaBit was a similar encrypted email service that failed because it was a U.S. business in the Snowden Era). If you are looking for an alternative to the Google G-Suite, then I would go with ProtonMail since they seem to have a more developed “Proton”-Suite that they are in the process of expanding, including ProtonVPN, ProtonCalendar, ProtonDrive, etc.

Use an E2EE chat app like Signal or Threema. I use both. While Signal requires a phone number to use, Threema does not, which could be a deal-breaker for those who value absolute anonymity. While WhatsApp does claim to be E2EE, the fact that it is owned by Facebook means that you are letting a “fox” of privacy violations guard your “henhouse” of private communication. Why worry about Facebook sneaking into your chat? Just use one of the other options.

If you are configuring a Linux distro, choose the option to encrypt your hard drive. This will mean using two passwords every time you login to your computer, but it will make it much harder for somebody to physically access your data after you shut down your computer. If you can barely handle keeping track of one password, then ignore that last part about encrypting your own hard drive.

How encryption could be used against you

Just like how encrypting your own data makes it harder for attackers to access it, the tables could also be turned against you when the attacker is the one who encrypts your data, like with WannaCry.

WannaCry is a type of ransomware that caused a lot of problems for its victims. It encrypted the data on their computers and demanded a ransom of Bitcoin in exchange for the user (supposedly) getting their data decrypted. Of course, with criminals you can never really know whether they are telling the truth, since they could theoretically keep demanding more and more money even after the victim sends the original ransom.

Why the government does not like widespread encryption

For all its benefits to people who want to remain private, encryption also can stand in the way of governments performing surveillance on them. Since the state is responsible for enforcing laws against things like terrorism, money laundering, and other shady activities, the mass-adoption of encryption makes their job harder. However, when the government takes action to oppose encryption (like requiring backdoors for law enforcement), it often violates the right to privacy of the individuals whose data is no longer private.

For those more interested, check out the story of when the NSA tried to create a hardware backdoor to encryption called the “Clipper Chip.”

Answer fan questions.

Special thanks to NanaRepublic on ThinkSpot for their questions to me last week regarding several of these encryption-related things. https://www.thinkspot.com/discourse/6mueMn/post/outsmartbigbrother/sneak-peak-at-the-thumbnail-for-my-first-episode/BetQBap

There is still a TON of stuff that I need to learn about the details of how public key cryptography is able to actually work. We’ve barely scratched the surface here but hopefully this video helps you to be able to use encryption more in your own life.

My challenge to you all this week is…

Find something that you need to encrypt and DO IT. Let me know in the comments what things you are starting to encrypt.

What topics would you like me to cover in future videos? Please let me know in the comments.

Please consider following and sharing if you like this content.

Stay free, everyone!

⚛️

Description:

Link to GitHub for the encryption theme project

https://github.com/Outsmart-Big-Brother/content-themes/blob/main/encryptionTheme.py

Credits

Music by TimMoor from Pixabayhttps://pixabay.com/music/

Intro video by Thomas Breher from Pixabay — https://pixabay.com/videos/security-data-security-data-backup-2176/

WannaCry image— https://www.wired.it/internet/web/2019/05/13/wannacry-download-virus/?refresh_ce=

Clipper Chip image — https://cryptomuseum.com/crypto/usa/img/301216/020/full.jpg

For further study

ProtonMail — https://protonmail.com/

Tutanota — https://tutanota.com/

LavaBit —https://www.eff.org/cases/lavabit, https://lavabit.com/

Encrypted chat apps — https://protonmail.com/blog/whatsapp-alternatives/

Clipper Chip government backdoor to encryption —https://cryptomuseum.com/crypto/usa/clipper.htm

WannaCry ransomware — https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/

Licence

All original content by Outsmart Big Brother™ here is licenced under Creative Commons Attribution.

All non-original content here is either copyright-free or fair-use-applicable.

DISCLAIMER

This content is for educational purposes only, and is NOT legal, financial, cybersecurity, or any other type of professional advice. Different individuals have different levels of risk tolerance. Not all privacy and censorship resistant technologies are appropriate for all situations. There also may be new tools, methods, and technologies which render portions of this content obsolete. Outsmart Big Brother and its agents make no warranty (whether express or implied) and shall bear no liability for bad stuff that happens as a result of attempting to use technologies, tools, websites, or other things mentioned in this content or any content (whether on outsmartbigbrother.com, social media sites, or elsewhere). Use your brain. Do your homework. Accept the risks that come with making your own choices in life. Be a responsible adult.

--

--

Outsmart Big Brother™

Providing security-focused web development services. Learn more: https://obb.ll.land/. Book a FREE consultation: https://calendly.com/obb-ll/meeting