Skip to content

Used by Meta, Apple and Google: What is end-to-end encryption and how does it work? Is it really that safe?

The end-to-end encryption It is a technology that is being used to protect people’s communications. Whether through messaging apps, emails or saving information in the cloud, this type of encryption helps to protect the privacy of users from third parties.

Although the name can be recognized more by the notice that WhatsApp gives every time we start a conversation with another person, other apps or services are also using this technology. Meta, owner of the messaging platform, has also included this type of encryption for Messenger and Instagram months ago.

LOOK: ByteDance, owner of TikTok, acknowledges that employees accessed information from journalists in the app

In addition, Apple recently added end-to-end encryption to its cloud service, iCloud., for example. Another case is that of Google, which is also testing adding this technology to emails sent by Gmailalthough at the moment it will only be available to its Workplace clients, in its beta version.

Namely, more and more companies are opting for end-to-end encryption to protect all the information that people send to each other. What exactly is it and is it really as safe as it says?

LOOK: WhatsApp: how do I know if another person has logged in with my account on another device?

What is end-to-end encryption and how does it work?

According to Sol González, a cybersecurity researcher at ESET Latin America, it is a way to protect information. “End-to-end encryption (E2EE) is a type of encryption that used to protect communication between two devices”, he points out in an interview with Trade.

This communication can only be seen by the person receiving it. “With end-to-end encryption, information sent between devices is encrypted in such a way that it can only be read by the recipient. In other words, although the information passes through different points in the network, no one else can access it”, he adds.

Sol González, ESET cybersecurity researcher. | (Photo: LinkedIn)

To do this, keys are used that only the receiving devices can decrypt. “End-to-end encryption works by using encryption keys to encrypt information being sent between two devices.. When one device sends information to another, the information is encrypted using a specific encryption key. The receiving device then decrypts the information using the same key”, indicates the expert.

While there are several different types of end-to-end encryption, according to González, the process generally works as follows:

LOOK: A new Trojan called ‘The Godfather’ has attacked more than 400 bank and cryptocurrency apps

Is end-to-end encryption technology the same for different apps and tools?

According to the cybersecurity researcher, this varies only depending on what it is applied to. “End-to-end encryption can be used in different types of services and applications, such as the cloud, email, and messaging applications. However, the way end-to-end encryption is implemented can vary depending on the service or application in question”, he assures.

End-to-end encryption is focused on protecting information in specific situations. “In the case of the cloud, end-to-end encryption is often used to protect stored data and ensure that only authorized users can access it.. For example, iCloud uses end-to-end encryption to protect data stored in the cloud, such as photos, documents, and messages.”, says González.

LOOK: They could even impersonate you: why shouldn’t you post your diplomas on LinkedIn?

In some apps or tools, the use of this technology is focused on protecting communication between two or more people. “In the case of emails, end-to-end encryption is often used to protect the privacy of email messages and prevent them from being accessed by third parties“, Add.

The same goes for the apps we already know that use end-to-end encryption. “In the case of messaging applications, end-to-end encryption is often used to protect the privacy of conversations and prevent third parties from accessing them. WhatsApp, for example, uses end-to-end encryption to protect its users’ conversations.”, asserts the expert.

End-to-end encryption is mainly used to protect the privacy of our conversations.

End-to-end encryption is mainly used to protect the privacy of our conversations. (Pixabay/)

Is end-to-end encryption really that secure?

When going through various channels, the information is protected by this technology. “Usually, end-to-end encryption is an effective way to protect the privacy of information stored and sent through different services and applications”, affirms González.

Despite its effectiveness, end-to-end encryption has a weakness: device security. “Like any other form of encryption, end-to-end encryption is not completely secure and can be vulnerable in certain situations. One of the weaknesses of end-to-end encryption is that its security is highly dependent on the security of users’ devices.. If these are compromised or if the encryption key has been obtained in an unauthorized manner, end-to-end encryption may not provide the necessary protection”, he points out.

LOOK: ChatGPT, the AI ​​that allows you to talk to it, could be used by cybercriminals to steal data

Being a recipient of this encrypted information, our device has full access, so if it is compromised it would expose any type of communication. “It is important to note that end-to-end encryption does not protect against unauthorized access to information while it is stored on users’ devices.. Therefore, it is necessary to take additional measures to protect the security of the devices and maintain the privacy of your data.”, concludes the researcher.

Therefore, as with any other type of security measure, will only work if users do not compromise the devices that store or have access to the encrypted information. That is to say, it is up to people to maintain this effective way of protecting their own privacy.

Source: Elcomercio

Share this article:
globalhappenings news.jpg
most popular