end-to-end encryption

back to index

description: cryptographic paradigm involving uninterrupted protection of data traveling between two communicating parties

56 results

Extremely Hardcore: Inside Elon Musk's Twitter

by Zoë Schiffer  · 13 Feb 2024  · 343pp  · 92,693 words

launch encrypted DMs, a project that had failed to get off the ground in Twitter 1.0. Popular messaging apps like WhatsApp and Signal brought end-to-end encryption to the mainstream, allowing users to talk to one another without fear of their messages being read by a third party. Even if the companies

Money in the Metaverse: Digital Assets, Online Identities, Spatial Computing and Why Virtual Worlds Mean Real Business

by David G. W. Birch and Victoria Richardson  · 28 Apr 2024  · 249pp  · 74,201 words

the Extensible Message Transport Protocol (XMTP): a messaging protocol that has been designed and purpose built to bring secure communication to web3. It enables fully end-to-end encrypted messaging between blockchain accounts such that only the participants of a conversation are able to decrypt and read messages. Participants in a conversation can also

Gilded Rage: Elon Musk and the Radicalization of Silicon Valley

by Jacob Silverman  · 9 Oct 2025  · 312pp  · 103,645 words

with the security state. In 2013, Edward Snowden’s revelations of mass domestic surveillance—often with the assistance of big tech companies—disrupted that relationship. End-to-end encryption—making data in transit unreadable by snooping parties—became table stakes for many tech companies. Some talked a big game on privacy. Others actually challenged

@War: The Rise of the Military-Internet Complex

by Shane Harris  · 14 Sep 2014  · 340pp  · 96,149 words

company was also using other tactics, such as implementing stronger encryption for its users, and moving toward a “secure sockets layer” service that would set end-to-end encryption by default for everyone logged in to their Google account. Threat signatures alone “don’t work anymore,” Schmidt said. “The threats don’t just come

Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World

by Bruce Schneier  · 3 Sep 2018  · 448pp  · 117,325 words

would be both difficult and insecure. I evaluated the standard in 1999 and concluded that its unnecessary complexity had a “devastating effect” on security. Today, end-to-end encryption still isn’t ubiquitous on the Internet, although it’s getting better. A second example: in the secret government-only standards process for digital cellular

that the NSA ensured that algorithms used to encrypt voice traffic between the handset and the tower are easily breakable, and that there is no end-to-end encryption between the two communicating parties. The result is that your cell phone conversations can easily be monitored. Both of these were probably part of NSA

AS POSSIBLE Governments should have the goal of encrypting as much of the Internet+ as possible. There are many facets to this. One: we need end-to-end encryption for communications. This means that all communications should be encrypted from the sender’s device to the receiver’s device, and that no one in

is the encryption used by many messaging apps, like iMessage, WhatsApp, and Signal. This is how encryption in your browser works. In some cases, true end-to-end encryption isn’t desirable. Most of us want Google to be able to read our e-mail, because that’s how it sorts it into folders

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

by Bruce Schneier  · 2 Mar 2015  · 598pp  · 134,339 words

.cypherpunks.ca/otr-wpes.pdf. Google is now offering encrypted e-mail: Stephan Somogyi (3 Jun 2014), “Making end-to-end encryption easier to use,” Google Online Security Blog, http://googleonlinesecurity.blogspot.com/2014/06/making-end-to-end-encryption-easier-to.html. TLS—formerly SSL—is a protocol: Tim Dierks and Eric Rescorla (17 Apr 2014), “The

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems

by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski and Adam Stubblefield  · 29 Mar 2020  · 1,380pp  · 190,710 words

core functionality despite temporary loss of online storage, the ability to show updates from others, or integration with chat features. In a chat application with end-to-end encryption, users might occasionally change their encryption key used for protecting communications. Such an application would keep all previous communications accessible, because their authenticity is not

The Great Firewall of China

by James Griffiths;  · 15 Jan 2018  · 453pp  · 114,250 words

competition from these apps in turn forced larger tech companies to adopt similar security protocols, with Facebook-owned WhatsApp and Microsoft-owned Skype both adopting end-to-end encryption for fear of losing market share. Encryption doesn’t only hamper spies; it can also help bypass filtering, making DPI impossible and forcing censors to

The Debian Administrator's Handbook, Debian Wheezy From Discovery to Mastery

by Raphaal Hertzog and Roland Mas  · 24 Dec 2013  · 678pp  · 159,840 words

channel to discuss it (but users can still have one-to-one private conversations if needed). The IRC protocol is older, and does not allow end-to-end encryption of the messages; it is still possible to encrypt the communications between the users and the server by tunneling the IRC protocol inside SSL. IRC

Snowden's Box: Trust in the Age of Surveillance

by Jessica Bruder and Dale Maharidge  · 29 Mar 2020  · 159pp  · 42,401 words

have played — voluntarily or not — in the NSA’s regime,’’ wrote German media scholar Till Wäscher. In 2016, the popular messaging service WhatsApp began using end-to-end encryption to protect users’ communications. The same year, tensions rose as Apple defied a federal court order to help the FBI break into an iPhone belonging

the New York Times. “A lot of people are justifiably concerned about that.” Another reasonable choice for secure messaging is WhatsApp, which uses the same end-to-end encryption technology that Marlinspike developed for Signal and boasts more than 1.5 billion users worldwide. However, WhatsApp was acquired for $19 billion by Facebook in

form of access to content even for preventing or investigating the most serious crimes,’’ they wrote in a letter to Mark Zuckerberg. Facebook fired back. ‘‘End-to-end encryption already protects the messages of over a billion people every day,’’ Andy Stone, a company spokesman, told the New York Times. ‘‘We strongly oppose government

, consider setting up encrypted email. As of this writing, one of the easiest options is ProtonMail, a free, open-source provider based in Switzerland with end-to-end encryption. It doesn’t offer all the bells and whistles found on commercial services like Gmail, Outlook, and YahooMail, but we’ve both found it tremendously

that led to this book, we convinced our Harper’s editor, James Marcus, to get a ProtonMail account too.) The service does have drawbacks: its end-to-end encryption only works if you’re emailing another ProtonMail user. The main benefit is that your messages remain encrypted on ProtonMail’s server. If government officials

to provide their users with a reasonable standard of security. Their report noted that “only three of the companies assessed — Apple, LINE, Viber Media — apply end-to-end encryption as a default to all of their IM services. Of these, none are fully transparent about the system of encryption they are using.” The researchers

companies don’t practice what they preach. “For example, Microsoft has a clear stated commitment to human rights, but is not applying any form of end-to-end encryption on its Skype service,” they wrote. Other organizations are leading the charge to protect the rights of minorities and targeted groups. All Out, a global

The Hype Machine: How Social Media Disrupts Our Elections, Our Economy, and Our Health--And How We Must Adapt

by Sinan Aral  · 14 Sep 2020  · 475pp  · 134,707 words

Hacking Exposed: Network Security Secrets and Solutions

by Stuart McClure, Joel Scambray and George Kurtz  · 15 Feb 2001  · 260pp  · 40,943 words

Black Code: Inside the Battle for Cyberspace

by Ronald J. Deibert  · 13 May 2013  · 317pp  · 98,745 words

The Dark Net

by Jamie Bartlett  · 20 Aug 2014  · 267pp  · 82,580 words

Facebook: The Inside Story

by Steven Levy  · 25 Feb 2020  · 706pp  · 202,591 words

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

by Kevin Mitnick, Mikko Hypponen and Robert Vamosi  · 14 Feb 2017  · 305pp  · 93,091 words

The Codebreakers: The Comprehensive History of Secret Communication From Ancient Times to the Internet

by David Kahn  · 1 Feb 1963  · 1,799pp  · 532,462 words

Dark Mirror: Edward Snowden and the Surveillance State

by Barton Gellman  · 20 May 2020  · 562pp  · 153,825 words

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

by Nicole Perlroth  · 9 Feb 2021  · 651pp  · 186,130 words

Applied Cryptography: Protocols, Algorithms, and Source Code in C

by Bruce Schneier  · 10 Nov 1993

Surveillance Valley: The Rise of the Military-Digital Complex

by Yasha Levine  · 6 Feb 2018  · 474pp  · 130,575 words

Active Measures: The Secret History of Disinformation and Political Warfare

by Thomas Rid

Exim: The Mail Transfer Agent

by Philip Hazel  · 7 Jul 2001  · 632pp  · 223,899 words

There's a War Going on but No One Can See It

by Huib Modderkolk  · 1 Sep 2021  · 295pp  · 84,843 words

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

by Joseph Menn  · 3 Jun 2019  · 302pp  · 85,877 words

Spies, Lies, and Algorithms: The History and Future of American Intelligence

by Amy B. Zegart  · 6 Nov 2021

Docker in Action

by Jeff Nickoloff and Stephen Kuenzli  · 10 Dec 2019  · 629pp  · 109,663 words

Talk Is Cheap: Switching to Internet Telephones

by James E. Gaskin  · 15 Mar 2005  · 731pp  · 134,263 words

The End of Secrecy: The Rise and Fall of WikiLeaks

by The "Guardian", David Leigh and Luke Harding  · 1 Feb 2011  · 322pp  · 99,066 words

Future Politics: Living Together in a World Transformed by Tech

by Jamie Susskind  · 3 Sep 2018  · 533pp

Digital Empires: The Global Battle to Regulate Technology

by Anu Bradford  · 25 Sep 2023  · 898pp  · 236,779 words

System Error: Where Big Tech Went Wrong and How We Can Reboot

by Rob Reich, Mehran Sahami and Jeremy M. Weinstein  · 6 Sep 2021

The Future of the Internet: And How to Stop It

by Jonathan Zittrain  · 27 May 2009  · 629pp  · 142,393 words

Reset

by Ronald J. Deibert  · 14 Aug 2020

Enshittification: Why Everything Suddenly Got Worse and What to Do About It

by Cory Doctorow  · 6 Oct 2025  · 313pp  · 94,415 words

An Ugly Truth: Inside Facebook's Battle for Domination

by Sheera Frenkel and Cecilia Kang  · 12 Jul 2021  · 372pp  · 100,947 words

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems

by Martin Kleppmann  · 16 Mar 2017  · 1,237pp  · 227,370 words

Twitter and Tear Gas: The Power and Fragility of Networked Protest

by Zeynep Tufekci  · 14 May 2017  · 444pp  · 130,646 words

The Wires of War: Technology and the Global Struggle for Power

by Jacob Helberg  · 11 Oct 2021  · 521pp  · 118,183 words

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems

by Martin Kleppmann  · 17 Apr 2017

Culture Warlords: My Journey Into the Dark Web of White Supremacy

by Talia Lavin  · 14 Jul 2020  · 231pp  · 71,299 words

News and How to Use It: What to Believe in a Fake News World

by Alan Rusbridger  · 26 Nov 2020  · 371pp  · 109,320 words

Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations

by Thomas L. Friedman  · 22 Nov 2016  · 602pp  · 177,874 words

No Filter: The Inside Story of Instagram

by Sarah Frier  · 13 Apr 2020  · 484pp  · 114,613 words

The Digital Party: Political Organisation and Online Democracy

by Paolo Gerbaudo  · 19 Jul 2018  · 302pp  · 84,881 words

Uncanny Valley: A Memoir

by Anna Wiener  · 14 Jan 2020  · 237pp  · 74,109 words

The Chaos Machine: The Inside Story of How Social Media Rewired Our Minds and Our World

by Max Fisher  · 5 Sep 2022  · 439pp  · 131,081 words

Ours to Hack and to Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet

by Trebor Scholz and Nathan Schneider  · 14 Aug 2017  · 237pp  · 67,154 words

The Art of UNIX Programming

by Eric S. Raymond  · 22 Sep 2003  · 612pp  · 187,431 words

The Quiet Coup: Neoliberalism and the Looting of America

by Mehrsa Baradaran  · 7 May 2024  · 470pp  · 158,007 words

Money, Real Quick: The Story of M-PESA

by Tonny K. Omwansa, Nicholas P. Sullivan and The Guardian  · 28 Feb 2012  · 140pp  · 91,067 words

No Is Not Enough: Resisting Trump’s Shock Politics and Winning the World We Need

by Naomi Klein  · 12 Jun 2017  · 357pp  · 94,852 words

Whistleblower: My Journey to Silicon Valley and Fight for Justice at Uber

by Susan Fowler  · 18 Feb 2020  · 205pp  · 71,872 words

House of Huawei: The Secret History of China's Most Powerful Company

by Eva Dou  · 14 Jan 2025  · 394pp  · 110,159 words

The Sirens' Call: How Attention Became the World's Most Endangered Resource

by Chris Hayes  · 28 Jan 2025  · 359pp  · 100,761 words

Super Pumped: The Battle for Uber

by Mike Isaac  · 2 Sep 2019  · 444pp  · 127,259 words