Donate

Protect Encryption, Protect Yourself

Encryption is under threat around the world. It’s up to all of us to take action to protect encryption, protect our data, and protect one another.

Use end-to-end encryption. Stand up for encryption. When we weaken or limit the use of encryption, all of us are put at greater risk.

Global Encryption Under Threat

Criminals can also use encryption. So some law enforcement agencies are concerned that encryption will stop them from getting the evidence or information they need. To address these concerns, some governments are trying to make companies create ways for them to access the content encrypted by the companies’ systems (a practice known as “exceptional access”).

No matter the method, there is no such thing as “exceptional” access. Criminals could discover and use the same way to get in.

How do law enforcement plan to access our data? If law enforcement can access our data, who else can too? And can we catch the bad guys?

What is Encryption?

Encryption is the process of scrambling or enciphering data so it can be read only by someone with the means to return it to its original state.

Encryption keeps criminals and spies from stealing information.  Although you might not realize it, you rely on encryption every day. It protects you while you browse the web, shop online, use mobile banking, or use secure messaging apps.

So encryption scrambles data, but how? What is end-to-end encryption? How else might encryption impact me?

How the Internet Society and Others Help

Effective encryption is key to secure online communications for everything, from financial transactions to healthcare. It is a foundational component upon which a trustworthy Internet is built.

The Internet Society is in a unique position to address the threat to encrypted communications posed by both governments and the private sector. As a trusted technical voice with a deeply connected community, we will bridge the gap between policymakers and the technical community by building and activating a global advocacy movement. In particular, we will articulate a compelling narrative of the dangers of weakening encryption technologies. 

By the end of 2020:

  • We will have developed a compelling narrative that advances end-to-end encryption against threats such as exceptional access.
  • We will have created a diverse and engaged global network of coalitions with participants aligned with our goals and efforts in this area.

By 2025, our aim is that exceptional access proposals will no longer be considered a viable action for governments. Rather, leading governments will promote the use of end-to-end encryption to protect networks, communications, and data. More tangibly, we expect legal and business imperatives will mean that Internet-based services and products, such as commonly used messaging applications and Internet of Things devices, will implement and use effective end-to-end encryption, thereby increasing the security of the Internet as a whole.

See how the Internet Society is working in this area to make the Internet more trusted.

Encryption News

Strong Encryption Is Central to Good Security – India’s Proposed Intermediary Rules Puts It at Risk
Strong Encryption Is Central to Good Security – India’s Proposed Intermediary Rules Puts It at Risk Thumbnail
Encryption 9 January 2020

Strong Encryption Is Central to Good Security – India’s Proposed Intermediary Rules Puts It at Risk

Security and encryption experts from around the world are calling on the Indian Ministry of Electronics and Information Technology (MeiTy) to...

What Is a Man in the Middle (MITM) Attack?
What Is a Man in the Middle (MITM) Attack? Thumbnail
Encryption 26 November 2019

What Is a Man in the Middle (MITM) Attack?

Simply put, MITM is an attack in which a third party gains access to the communications between two other...

Rachel Player Honored by Internet Security Research Group with Radiant Award
Rachel Player Honored by Internet Security Research Group with Radiant Award Thumbnail
Encryption 21 November 2019

Rachel Player Honored by Internet Security Research Group with Radiant Award

Internet security is accomplished by many unsung heroes. People who put their talent and passion into improving the Internet,...

Owning Your Keys: The Technical and Human Side of Encryption
Owning Your Keys: The Technical and Human Side of Encryption Thumbnail
Encryption 5 November 2019

Owning Your Keys: The Technical and Human Side of Encryption

Ever wonder if your next doctor’s appointment will result in jail time? Luckily most of us never have to...

What Scary Movies Can Teach Us About Internet Trust
What Scary Movies Can Teach Us About Internet Trust Thumbnail
Encryption 31 October 2019

What Scary Movies Can Teach Us About Internet Trust

Mad geniuses. Evil dolls. Slow zombies. This Halloween, we’ll see all of these horror film clichés come to life....

Your Day with Encryption
Your Day with Encryption Thumbnail
Encryption 22 October 2019

Your Day with Encryption

How often do you use encryption? It seems like the stuff of spy films, but you might be surprised...

Load more