The Encryption Misconception
When you hear “your data is encrypted,” most people imagine their information being completely unreadable to anyone except themselves. The much more nuanced and depends entirely on where and when the data is decrypted. Understanding this difference is crucial for making informed decisions about your privacy and security.
Data can also be encrypted many times and still be decrypted. The data can be encrypted many times and still be able to reverse the process.
Where Encryption Happens
-
Transport Encryption (like HTTPS):
- Protects data while it’s moving between points
- This is the green padlock in your browser
- Like an armored car moving valuable cargo
- Once delivered, the data is “unboxed” and readable
- Examples: Website connections, basic email transmission
-
End-to-End Encryption:
- Protects the actual content regardless of where it’s stored
- Like a locked safe that moves with your valuables
- Stays encrypted until you specifically decrypt it
- Examples: Signal messages, properly configured email encryption
for end-to-end video calls, the video is encrypted on your device and decrypted on the recipient’s device. The service provider cannot see the video.
Following Your Data’s Journey
Let’s trace what happens to your data in two common scenarios:
What Most Services Use
- You fillout a form on your device
- The data is sent through an encrypted connection (HTTPS)
- It arrives at the service’s servers and the data is decrypted
- The service processes and stores your data
- When requested, the service retrieves and reads your data
- The data is sent back through an encrypted connection
- You see the decrypted data on your screen
The critical point here is that the service provider can read your data at steps 3-5.
True End-to-End Encryption
- You fillout a from on your device
- The data is encrypted on your device
- The encrypted data travels through encrypted connections
- The service stores the data, but cannot read it
- The recipient’s device downloads the encrypted data
- The data is decrypted on your device
- You see the decrypted data on your screen
Common Misconceptions
Email: Not as Private as You Think
Most email services encrypt the connection between you and their servers (transport encryption). However, once your email arrives at the server:
- The service can read your emails
- Emails can travel unencrypted between different email providers
- Your emails are typically stored unencrypted on servers
To achieve email privacy, you need to use additional encryption like PGP or S/MIME.
The Password Reset Understanding
If a service can reset your password and you don’t lose access to your encrypted data, it means they can access your data. True end-to-end encryption means:
- Only you have the decryption keys
- If you lose your password/keys, your data is permanently inaccessible
- The service provider cannot help you recover your data
- A review of how popular services handle your data: Apple, Microsoft, Google, and Self-hosted
Best Practices for Personal Security
To maximize your data security:
- Use end-to-end encrypted messaging apps for sensitive communications
- Enable full-disk encryption on all your devices
- Use a password manager with local encryption
- Be skeptical of services that claim “encryption” without specifying details
- Remember: If a service can read your data, so can anyone who compromises that service
The Bottom Line
When evaluating a service’s security, always ask: “Who can decrypt my data, and when?” If the answer includes anyone besides you and your intended recipients, your data isn’t truly private. Transport encryption is important but insufficient for sensitive information.
Remember: The internet is like a public space. If your data isn’t encrypted end-to-end, assume it is public.