{"id":7020,"date":"2016-04-08T04:53:45","date_gmt":"2016-04-08T08:53:45","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=7020"},"modified":"2019-11-22T10:10:53","modified_gmt":"2019-11-22T10:10:53","slug":"gostev-on-encryption","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/gostev-on-encryption\/7020\/","title":{"rendered":"Encryption across the board, not just apps"},"content":{"rendered":"<p>There is and always has been an inherent tension between an individual\u2019s right to data privacy and wider security concerns. This is unlikely to change, although the priority may shift depending on the geopolitical or security context. The important thing is to strike the right balance. Encryption sits at the heart of data privacy, and as the recent news shows, the debate about encryption is a heated one.<\/p>\n<p>Can anyone doubt that making products more secure makes the world a safer place? I don\u2019t think so. And we can applaud the efforts of Apple and WhatsApp to protect the privacy of their users\u2019 data by introducing end-to-end encryption into their instant messaging services.<\/p>\n<p>Their actions mean that email is now the most insecure form of digital communications. Free email services transmit messages across networks in plain text and users have no guarantee that their data is stored safely.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Whatsapp?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Whatsapp<\/a> adds end-to-end <a href=\"https:\/\/twitter.com\/hashtag\/encryption?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#encryption<\/a> to one billion users via <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a> <a href=\"https:\/\/t.co\/WNox0PeCQu\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/WNox0PeCQu<\/a> <a href=\"https:\/\/t.co\/Ul5abpexgO\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Ul5abpexgO<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/717814351932100608?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 6, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Not surprisingly, email is one of the primary vectors for cyberattack. It enables malicious actors to gain access to users\/company\u2019s networks, their information and their money. The content of emails are themselves a target for attackers. At Kaspersky Lab, we regularly encounter attacks that target email databases. We see more and more Chinese-speaking actors attacking companies with the aim of accessing their emails. And one of the most recent and certainly the largest example of data exfiltration \u2013 the \u201cPanama Papers\u201d \u2013 is also believed to have come about following the breach of an email server last year. It\u2019s frighteningly easy for attackers to get their hands on messages in plain text.<\/p>\n<p>End-to-end encryption will prevent attacks such as those known as Man in the Middle, where a malicious actor intercepts the email between the user and a server. But somehow that level of protection is rarely provided.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Poll?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Poll<\/a> Your thoughts on the end-to-end <a href=\"https:\/\/twitter.com\/hashtag\/encryption?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#encryption<\/a> from <a href=\"https:\/\/twitter.com\/WhatsApp?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@whatsapp<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/717722676119228416?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 6, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Encrypting email by default, or out-of-the box is hard. There are tools and plugins that an experienced user can use, but you need a certain level of computer knowledge to properly install and use encrypted mail. The majority of Internet users don\u2019t have such skills. There are some free encrypted email services on the market like ProtonMail, but unless these services have a billion users, they will not become a global solution to the problem of insecure email.<\/p>\n<p>Email is the communication method most in need of encryption. The sooner \u2013 the better. The solution needs to come from the top email software developers, such as for Microsoft\u2019s Outlook Exchange. WhatsApp got it right: encrypt everything, for one billion users, in one go. Email, it\u2019s your turn now.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aleks Gostev of Kaspersky Lab\u2019s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption<\/p>\n","protected":false},"author":44,"featured_media":7021,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2027,9],"tags":[1403,14,1406,19,261,584,1405,1404,526],"class_list":{"0":"post-7020","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"category-tips","10":"tag-aleks-gostev","11":"tag-apple","12":"tag-apple-vs-fbi","13":"tag-email","14":"tag-encryption","15":"tag-great","16":"tag-panama-papers","17":"tag-panamapapers","18":"tag-whatsapp"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/gostev-on-encryption\/7020\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/gostev-on-encryption\/7002\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/gostev-on-encryption\/6979\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/gostev-on-encryption\/8131\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/gostev-on-encryption\/7924\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/gostev-on-encryption\/11599\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/gostev-on-encryption\/11801\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/gostev-on-encryption\/6164\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/gostev-on-encryption\/8053\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/gostev-on-encryption\/10973\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/gostev-on-encryption\/11599\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/gostev-on-encryption\/11801\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/gostev-on-encryption\/11801\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/aleks-gostev\/","name":"Aleks Gostev"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=7020"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7020\/revisions"}],"predecessor-version":[{"id":17753,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7020\/revisions\/17753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/7021"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=7020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=7020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=7020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}