description: cryptographic paradigm involving uninterrupted protection of data traveling between two communicating parties
56 results
by Zoë Schiffer · 13 Feb 2024 · 343pp · 92,693 words
launch encrypted DMs, a project that had failed to get off the ground in Twitter 1.0. Popular messaging apps like WhatsApp and Signal brought end-to-end encryption to the mainstream, allowing users to talk to one another without fear of their messages being read by a third party. Even if the companies
by David G. W. Birch and Victoria Richardson · 28 Apr 2024 · 249pp · 74,201 words
the Extensible Message Transport Protocol (XMTP): a messaging protocol that has been designed and purpose built to bring secure communication to web3. It enables fully end-to-end encrypted messaging between blockchain accounts such that only the participants of a conversation are able to decrypt and read messages. Participants in a conversation can also
by Jacob Silverman · 9 Oct 2025 · 312pp · 103,645 words
with the security state. In 2013, Edward Snowden’s revelations of mass domestic surveillance—often with the assistance of big tech companies—disrupted that relationship. End-to-end encryption—making data in transit unreadable by snooping parties—became table stakes for many tech companies. Some talked a big game on privacy. Others actually challenged
by Shane Harris · 14 Sep 2014 · 340pp · 96,149 words
company was also using other tactics, such as implementing stronger encryption for its users, and moving toward a “secure sockets layer” service that would set end-to-end encryption by default for everyone logged in to their Google account. Threat signatures alone “don’t work anymore,” Schmidt said. “The threats don’t just come
by Bruce Schneier · 3 Sep 2018 · 448pp · 117,325 words
would be both difficult and insecure. I evaluated the standard in 1999 and concluded that its unnecessary complexity had a “devastating effect” on security. Today, end-to-end encryption still isn’t ubiquitous on the Internet, although it’s getting better. A second example: in the secret government-only standards process for digital cellular
…
that the NSA ensured that algorithms used to encrypt voice traffic between the handset and the tower are easily breakable, and that there is no end-to-end encryption between the two communicating parties. The result is that your cell phone conversations can easily be monitored. Both of these were probably part of NSA
…
AS POSSIBLE Governments should have the goal of encrypting as much of the Internet+ as possible. There are many facets to this. One: we need end-to-end encryption for communications. This means that all communications should be encrypted from the sender’s device to the receiver’s device, and that no one in
…
is the encryption used by many messaging apps, like iMessage, WhatsApp, and Signal. This is how encryption in your browser works. In some cases, true end-to-end encryption isn’t desirable. Most of us want Google to be able to read our e-mail, because that’s how it sorts it into folders
by Bruce Schneier · 2 Mar 2015 · 598pp · 134,339 words
.cypherpunks.ca/otr-wpes.pdf. Google is now offering encrypted e-mail: Stephan Somogyi (3 Jun 2014), “Making end-to-end encryption easier to use,” Google Online Security Blog, http://googleonlinesecurity.blogspot.com/2014/06/making-end-to-end-encryption-easier-to.html. TLS—formerly SSL—is a protocol: Tim Dierks and Eric Rescorla (17 Apr 2014), “The
by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski and Adam Stubblefield · 29 Mar 2020 · 1,380pp · 190,710 words
core functionality despite temporary loss of online storage, the ability to show updates from others, or integration with chat features. In a chat application with end-to-end encryption, users might occasionally change their encryption key used for protecting communications. Such an application would keep all previous communications accessible, because their authenticity is not
by James Griffiths; · 15 Jan 2018 · 453pp · 114,250 words
competition from these apps in turn forced larger tech companies to adopt similar security protocols, with Facebook-owned WhatsApp and Microsoft-owned Skype both adopting end-to-end encryption for fear of losing market share. Encryption doesn’t only hamper spies; it can also help bypass filtering, making DPI impossible and forcing censors to
by Raphaal Hertzog and Roland Mas · 24 Dec 2013 · 678pp · 159,840 words
channel to discuss it (but users can still have one-to-one private conversations if needed). The IRC protocol is older, and does not allow end-to-end encryption of the messages; it is still possible to encrypt the communications between the users and the server by tunneling the IRC protocol inside SSL. IRC
by Jessica Bruder and Dale Maharidge · 29 Mar 2020 · 159pp · 42,401 words
have played — voluntarily or not — in the NSA’s regime,’’ wrote German media scholar Till Wäscher. In 2016, the popular messaging service WhatsApp began using end-to-end encryption to protect users’ communications. The same year, tensions rose as Apple defied a federal court order to help the FBI break into an iPhone belonging
…
the New York Times. “A lot of people are justifiably concerned about that.” Another reasonable choice for secure messaging is WhatsApp, which uses the same end-to-end encryption technology that Marlinspike developed for Signal and boasts more than 1.5 billion users worldwide. However, WhatsApp was acquired for $19 billion by Facebook in
…
form of access to content even for preventing or investigating the most serious crimes,’’ they wrote in a letter to Mark Zuckerberg. Facebook fired back. ‘‘End-to-end encryption already protects the messages of over a billion people every day,’’ Andy Stone, a company spokesman, told the New York Times. ‘‘We strongly oppose government
…
, consider setting up encrypted email. As of this writing, one of the easiest options is ProtonMail, a free, open-source provider based in Switzerland with end-to-end encryption. It doesn’t offer all the bells and whistles found on commercial services like Gmail, Outlook, and YahooMail, but we’ve both found it tremendously
…
that led to this book, we convinced our Harper’s editor, James Marcus, to get a ProtonMail account too.) The service does have drawbacks: its end-to-end encryption only works if you’re emailing another ProtonMail user. The main benefit is that your messages remain encrypted on ProtonMail’s server. If government officials
…
to provide their users with a reasonable standard of security. Their report noted that “only three of the companies assessed — Apple, LINE, Viber Media — apply end-to-end encryption as a default to all of their IM services. Of these, none are fully transparent about the system of encryption they are using.” The researchers
…
companies don’t practice what they preach. “For example, Microsoft has a clear stated commitment to human rights, but is not applying any form of end-to-end encryption on its Skype service,” they wrote. Other organizations are leading the charge to protect the rights of minorities and targeted groups. All Out, a global
by Sinan Aral · 14 Sep 2020 · 475pp · 134,707 words
by Stuart McClure, Joel Scambray and George Kurtz · 15 Feb 2001 · 260pp · 40,943 words
by Ronald J. Deibert · 13 May 2013 · 317pp · 98,745 words
by Jamie Bartlett · 20 Aug 2014 · 267pp · 82,580 words
by Steven Levy · 25 Feb 2020 · 706pp · 202,591 words
by Kevin Mitnick, Mikko Hypponen and Robert Vamosi · 14 Feb 2017 · 305pp · 93,091 words
by David Kahn · 1 Feb 1963 · 1,799pp · 532,462 words
by Barton Gellman · 20 May 2020 · 562pp · 153,825 words
by Nicole Perlroth · 9 Feb 2021 · 651pp · 186,130 words
by Bruce Schneier · 10 Nov 1993
by Yasha Levine · 6 Feb 2018 · 474pp · 130,575 words
by Thomas Rid
by Philip Hazel · 7 Jul 2001 · 632pp · 223,899 words
by Huib Modderkolk · 1 Sep 2021 · 295pp · 84,843 words
by Joseph Menn · 3 Jun 2019 · 302pp · 85,877 words
by Amy B. Zegart · 6 Nov 2021
by Jeff Nickoloff and Stephen Kuenzli · 10 Dec 2019 · 629pp · 109,663 words
by James E. Gaskin · 15 Mar 2005 · 731pp · 134,263 words
by The "Guardian", David Leigh and Luke Harding · 1 Feb 2011 · 322pp · 99,066 words
by Jamie Susskind · 3 Sep 2018 · 533pp
by Anu Bradford · 25 Sep 2023 · 898pp · 236,779 words
by Rob Reich, Mehran Sahami and Jeremy M. Weinstein · 6 Sep 2021
by Jonathan Zittrain · 27 May 2009 · 629pp · 142,393 words
by Ronald J. Deibert · 14 Aug 2020
by Cory Doctorow · 6 Oct 2025 · 313pp · 94,415 words
by Sheera Frenkel and Cecilia Kang · 12 Jul 2021 · 372pp · 100,947 words
by Martin Kleppmann · 16 Mar 2017 · 1,237pp · 227,370 words
by Zeynep Tufekci · 14 May 2017 · 444pp · 130,646 words
by Jacob Helberg · 11 Oct 2021 · 521pp · 118,183 words
by Martin Kleppmann · 17 Apr 2017
by Talia Lavin · 14 Jul 2020 · 231pp · 71,299 words
by Alan Rusbridger · 26 Nov 2020 · 371pp · 109,320 words
by Thomas L. Friedman · 22 Nov 2016 · 602pp · 177,874 words
by Sarah Frier · 13 Apr 2020 · 484pp · 114,613 words
by Paolo Gerbaudo · 19 Jul 2018 · 302pp · 84,881 words
by Anna Wiener · 14 Jan 2020 · 237pp · 74,109 words
by Max Fisher · 5 Sep 2022 · 439pp · 131,081 words
by Trebor Scholz and Nathan Schneider · 14 Aug 2017 · 237pp · 67,154 words
by Eric S. Raymond · 22 Sep 2003 · 612pp · 187,431 words
by Mehrsa Baradaran · 7 May 2024 · 470pp · 158,007 words
by Tonny K. Omwansa, Nicholas P. Sullivan and The Guardian · 28 Feb 2012 · 140pp · 91,067 words
by Naomi Klein · 12 Jun 2017 · 357pp · 94,852 words
by Susan Fowler · 18 Feb 2020 · 205pp · 71,872 words
by Eva Dou · 14 Jan 2025 · 394pp · 110,159 words
by Chris Hayes · 28 Jan 2025 · 359pp · 100,761 words
by Mike Isaac · 2 Sep 2019 · 444pp · 127,259 words