Communication over a network, unless strongly encrypted, is never just between two parties
Someone Could Listen
Unencrypted communication over the Internet works a lot like sending a postcard: it can be read by anybody along the delivery route. Communication is routed through intermediary computers and systems, which are connected to many more computers and systems. Encryption, or encoding information so it appears scrambled to anyone who doesn’t know the key, is a way to wrap a postcard in an envelope. While it can never be 100% secure, stronger encryption makes it harder for people to get to the contents.
Use strong passwords and don’t communicate sensitive information unless you know you have a secure channel.
How It Works:
Privacy and security are two different things, but you can’t have privacy without security. With the exception of a single dedicated line between two endpoints, information sent over a network goes through a whole series of hubs and routers and tiers of Internet service providers (ISPs). The default structure for a local wired network is a bus, which is where multiple devices share a single communication line, and the default structure for a wireless network is for multiple devices to share a single central access point. These configurations allow any device in the network to observe all of the information transferred through that network.
Encryption is a way of scrambling communications into a code so they can’t be read by other parties unless they have the decryption (decoding) key. Some common encryption protocols include WEP, WPA, and WPA2 (for wifi), https (for web browsers), PGP (for email), ssh (for terminal connections), and sftp (for transferring files). However, note that all participants in a secure wireless network have the decryption key for that network, so additional encryption may be needed to hide communications from those within your local network. The encryption “strength” is determined by which algorithm is used and the length of the decryption key; the stronger the encryption, the more computing resources someone needs to break it. Using multiple layers of encryption can also make communications safer.
All of these techniques can help, but the security bottleneck is always human behavior! Security can be broken from the human side because of weak passwords, because passwords are stored in insecure places (physical or virtual), or through social engineering like fake “phishing” emails.
What Could Happen? Real-World Stories:
What You Can Do About It:
Choose What You Use:
- Learn to recognize encryption technologies and use them whenever you can. For example, if a website offers an option where the URL (web address) begins with “https” rather than “http”, use https.
Get the Facts:
- Make sure your knowledge of current encryption technologies is up-to-date, as encryption is regularly breached, and then new encryption protocols are developed. (For example, the more recently developed WPA2 wifi protocol is more secure than WPA, which is more secure than WEP.)
Keep Account Information Secure:
- Keep passwords, PINs, and private keys secret; tell them to no one! Only you should ever need this information. If you use a private key, always keep it local to your computer or device; you should never need to transfer it to another user or another device.
How to Better Control Your Privacy — Guides:
Where to Learn More — Related Resources and Educational Tools:
What Do You Think? Discussion Questions:
- It’s very common for people to send a message or image over the network without intending to; has that ever happened to you?
- When you send a message over a network, how does it get from your device to the recipient’s device?
- What’s the difference between private communication and secure communication?
- What is encryption, and how is it used?
- When is the information you send over a network encrypted? How can you tell?
- Who can read your email, other than you and the recipient? Can employees at Google/Yahoo/Hotmail/etc. read your email?
- If you use a company or school email account, who can read your email?
- Can the government read your email?
- Are messages sent in Facebook or LinkedIn secure? Who can see them?
- Are files you store in the “cloud” — Google Drive/Dropbox/etc. — encrypted? Can employees of those companies read them?
- Can other people using the same wireless network see what you’re doing?
- Are text messages and phone calls more private than email?