preview

Information Of The Invasion Of Privacy

Good Essays

College students of today all exist in an age of growing interest and usage of the internet. We all use the internet for various different reasons; writing papers, studying, Netflix, Youtube, social media, etc. With this expanding network of students, it should be apparent for everyone that they know the ways and knowledge that is essential to protect their privacy from those who want to strip it away. Information of the invasion of privacy of the American people was released by Edward Snowden in 2013. In brief, Snowden let the world know what the NSA and other agencies were doing: they were acquiring private information from their own civilians. In the USA particularly, the NSA was eavesdropping on every single online action taken by …show more content…

Now, to actually use one of these apps, all you have to do is make sure your recipient has the same app, and send them a message. It is literally that easy. A lot of the steps of encryption use in these apps are taken care of by the apps themselves. To truly understand how this works, let us explore end-to-end encryption.
As previously mentioned, end-to-end encryption is a form of encryption in which only the endpoints of communication can read a message because the parties at both endpoints know the encryption key for messages. To establish this line of communication, systems that use end-to-end encryption use a form of Pretty Good Privacy (PGP) that is used for making and sharing a pre-shared secret. PGP can be explained through an analogy that treats the pre-shared secret as cookies, so imagine you are trying to send someone a box of some amazing cookies. You only want your recipient to get these cookies, so you go out to buy a safe and a key, called key A, to said safe. Your receiver has a private key, let us call this key B, of their own that can open any lock that matches to that key, so you get a small box that can be opened by key B to put key A in. Now for your friend to receive the cookies, send them the safe and the small box.
When your friend receives this, they should recognize that key B can open the smaller box with key A inside. Now that they have key A, they can open the safe and start to enjoy some delicious cookies. This is essentially the step of

Get Access