Not All Encryption Is Created Equal

IoTeX
IoTeX
Published in
2 min readApr 29, 2020

--

Encryption makes the digital world work. It consists of a few elegant math equations that scramble data before being sent over the internet where prying eyes could otherwise intercept it, read it, and manipulate it. Encryption is the reason everything from financial transactions to state secrets get passed around the internet nearly instantaneously, unlocking massive amounts of innovation, wealth, and prosperity as a result.

But not all encryption is created equal. Some forms of encryption expose the communications of internet users to private corporations and other third parties they choose to share your data with.

These days, many technology companies claim to have products that are “end-to-end encrypted”. This is often misleading. In March, Zoom falsely claimed in their security white paper that hosts could enable an “end-to-end encrypted meeting” with one click. After backlash, Zoom quietly changed the language in their white paper to avoid using the term “end-to-end encrypted”.

In this scenario, Zoom failed to acknowledge a critical distinction between standard web encryption, often called “client-to-server” (C2S) encryption, and true end-to-end (E2E) encryption.

Read Full Post Here >>> Not All Encryption Is Created Equal

⚡ ATTENTION: we have moved from Medium to our own hosted blog at iotex.io/blog

--

--