Donate
We are standing up for encryption in Australia.
You can too.

Protect Encryption, Protect Yourself

Encryption is under threat around the world. It’s up to all of us to take action to protect encryption, protect our data, and protect one another.

Use end-to-end encryption. Stand up for encryption. When we weaken or limit the use of encryption, all of us are put at greater risk.

Global Encryption Under Threat

Criminals can also use encryption. So some law enforcement agencies are concerned that encryption will stop them from getting the evidence or information they need. To address these concerns, some governments are trying to make companies create ways for them to access the content encrypted by the companies’ systems (a practice known as “exceptional access”).

No matter the method, there is no such thing as “exceptional” access. Criminals could discover and use the same way to get in.

How do law enforcement plan to access our data? If law enforcement can access our data, who else can too? And can we catch the bad guys?

What is Encryption?

Encryption is the process of scrambling or enciphering data so it can be read only by someone with the means to return it to its original state.

Encryption keeps criminals and spies from stealing information.  Although you might not realize it, you rely on encryption every day. It protects you while you browse the web, shop online, use mobile banking, or use secure messaging apps.

So encryption scrambles data, but how? What is end-to-end encryption? How else might encryption impact me?

How the Internet Society and Others Help

Encryption plays a vital role in increasing overall trust in the Internet and should be the norm for all traffic. The Internet Society is working to ensure encryption is available for everyone and is deployed as the default.

See how the Internet Society is working in this area to make the Internet more trusted.
Chrome’s HTTP warning seeks to cut web surveillance, tampering
CNET logo
In the News 24 July 2018

Chrome’s HTTP warning seeks to cut web surveillance, tampering

CNET
IETF 102, Day 2: Trust in the IETF
IETF 102, Day 2: Trust in the IETF Thumbnail
Encryption 17 July 2018

IETF 102, Day 2: Trust in the IETF

This week is IETF 102 in Montreal, Canada, and we’re bringing you daily blog posts highlighting the topics of interest...

Encryption Is Critical for the Australian Economy
Encryption Is Critical for the Australian Economy Thumbnail
Encryption 17 July 2018

Encryption Is Critical for the Australian Economy

On 17 July 2018, the Internet Society and its locally based chapter, Internet Australia, joined 75 organizations in signing...

Coalition calls on Australia’s government to reject plans to undermine encryption
Statements 17 July 2018

Coalition calls on Australia’s government to reject plans to undermine encryption

July 17, 2018 — Today, a global coalition led by civil society and technology experts sent a letter asking...

Considerations Regarding Encryption and Exceptional Access Briefing
Considerations Regarding Encryption and Exceptional Access Briefing Thumbnail
Encryption 13 June 2018

Considerations Regarding Encryption and Exceptional Access Briefing

On June 12, 2018, the Internet Society hosted a briefing for Congressional staff on Considerations Regarding Encryption and Exceptional...

Encryption Isn’t Perfect, That’s Why Choices Are Important
Encryption Isn’t Perfect, That’s Why Choices Are Important Thumbnail
Encryption 15 May 2018

Encryption Isn’t Perfect, That’s Why Choices Are Important

Encryption is a critical building block for online trust, but it’s never perfect. Any encryption you use is the...

Load More