{"id":29334,"date":"2017-02-27T21:01:23","date_gmt":"2017-02-27T13:01:23","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=29334"},"modified":"2022-06-28T20:36:53","modified_gmt":"2022-06-28T12:36:53","slug":"encryption-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/","title":{"rendered":"Data Encryption &#8211; What You Need to Know"},"content":{"rendered":"<p>You are being watched. <strong>Governments around the world have secret systems<\/strong> that spy on their citizens every hour of every day. These systems were designed to <strong>protect people from threats of international and domestic terrorism<\/strong>, but since they are run by humans, they tend to be used inappropriately too, like this <a target=\"_blank\" href=\"https:\/\/www.theguardian.com\/world\/2013\/sep\/27\/nsa-employee-spied-detection-internal-memo\" rel=\"noopener\">National Security Agency employee<\/a> who spied on 9 women until he was finally caught.<\/p>\n<p>Of course, it\u2019s not just governments who do this, individuals who know and have the <strong>capability to hack and plant malicious software into devices<\/strong> do it too every day. Victims can be regular people like you and me, and the most we\u2019ll lose is some <a href=\"https:\/\/www.hongkiat.com\/blog\/tag\/security-and-privacy\/\">privacy<\/a> (like <strong>our private messages being read by someone else<\/strong>, not creepy at all). But on a higher level, companies often get attacked and lose millions to <strong>billions of dollars worth of information<\/strong>.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-1\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/send-encrypted-emails\/\" class=\"ref-block__link\" title=\"Read More: How to Securely Send Emails in Gmail Using SafeGmail\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Securely Send Emails in Gmail Using SafeGmail<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/send-encrypted-emails.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-16367 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/send-encrypted-emails.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Securely Send Emails in Gmail Using SafeGmail<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tGmail is a popular and secure email service, but if you want an extra layer of protection when...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<p>How is this possible? It\u2019s either <strong>poor encryption on devices<\/strong> with weak security settings or the attacker is highly advanced and has the necessary skills and <strong>machines that can penetrate even fortresses<\/strong>.<\/p>\n<figure><a target=\"_blank\" href=\"https:\/\/www.pexels.com\/photo\/black-and-white-cctv-cameras-179993\/\" rel=\"noopener nofollow\"> <img decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/surveillance.jpg\"><\/a><figcaption><a target=\"_blank\" href=\"https:\/\/www.pexels.com\/photo\/black-and-white-cctv-cameras-179993\/\" rel=\"noopener nofollow\">IMAGE: Thomas W<\/a> <\/figcaption><\/figure>\n<p>Big words, wow, and <strong>I hope that got your attention<\/strong>. It might sound sci-fi-ish to you but this happens daily. Even as you are reading this. But the good thing is that there are <strong>several measures in which you can protect your data<\/strong> from these bad elements through encryption with the help of device manufacturers and security experts, and this article attempts to explain <a href=\"https:\/\/www.hongkiat.com\/blog\/how-to-encrypt-data-or-files\/\">how encryption works<\/a> to do exactly this.<\/p>\n<h3>First, why is encryption important?<\/h3>\n<p>Good question. Consider a scenario in which a system is <strong>password protected with no anonymous logins or unauthorized use<\/strong>. However, if someone wants to access your data they can simply factory reset it. The goal of encrypting your data, on the other hand, is to <strong>protect your files even if someone gains illegal access to it<\/strong>.<\/p>\n<figure><a target=\"_blank\" href=\"http:\/\/negativespace.co\/photos\/credit-card-payment\/\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/encryption-important.jpg\"><\/a><figcaption><a target=\"_blank\" href=\"http:\/\/negativespace.co\/photos\/credit-card-payment\/\" rel=\"noopener\">IMAGE: Negative Space<\/a> <\/figcaption><\/figure>\n<p>Another way of looking at this is <strong>if your phone, laptop, or desktop was stolen<\/strong>, you may say it\u2019s password protected, but <strong>that\u2019s easy to bypass<\/strong>. The thief can simply remove the SD card or hard disk and mount it elsewhere and they\u2019ll have access to your files already. But if you encrypt your data, <strong>no one will be able to approach your data<\/strong>.<\/p>\n<p>Neat, eh?<\/p>\n<p>But that\u2019s just for your files. What about your <strong>confidential information that gets sent through email or messaging applications<\/strong>? There is this thing we call end-to-end encryption that a couple of messaging apps are using, such as <strong>WhatsApp and Facebook Messenger<\/strong>.<\/p>\n<h3>What is End-to-end encryption?<\/h3>\n<p>End-to-end encryption (E2EE) is a method where the <strong>parties communicating<\/strong> are the <strong>only ones who can understand the message being delivered<\/strong>. This means that eavesdroppers will be unable to listen to what is being talked about. Even the owners of the said channel like the <strong>telecom service providers, ISPs, and even app owners<\/strong> are not able to access your information.<\/p>\n<p>The <strong>message is encrypted in such a way<\/strong> that the keys to deciphering the data only belong to the <strong>users who are communicating with each other<\/strong> and no third party can decipher it.<\/p>\n<h3>How is the key passed to end-to-end encryption?<\/h3>\n<p>Let\u2019s put it this way, <strong>Bob texts his wife Alice<\/strong>. Each of them starts with a common color or a public key, and a personal private color or a private key. When Bob sent <strong>his text to Alice, his color (private key) is mixed with the common color (public key)<\/strong>. Alice then receives the message and combines it with her own personal private color, and <strong>so she can read the message Bob sent<\/strong> her.<\/p>\n<figure><a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Diffie%E2%80%93Hellman_key_exchange\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/encryption.jpg\"><\/a><figcaption><a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Diffie%E2%80%93Hellman_key_exchange\" rel=\"noopener\">IMAGE: Wikipedia<\/a> <\/figcaption><\/figure>\n<p>This is called the <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Diffie%E2%80%93Hellman_key_exchange\" rel=\"noopener\">Diffie-Hellman key exchange<\/a>.<\/p>\n<h3>What is Public Key and Private Key?<\/h3>\n<p>Public and Private Key Pairs are composed of <strong>two unique, but related strings<\/strong> of randomly generated numbers. A good example would be:<\/p>\n<p><code>20438 0145 00B1 28CB C9FA 5BB4 56DE 6D43 8BB1 E16A 5AB7 F3B0 5ECE 657F E6F1 CDF2 3FE4 D81A 7E8F B384 B1F1 3C2C 92BB 60AB BF40 C7D4 B6E4 C044 B84A DD74 C122 4B0A CB6F 52C4 C20B 0C0A 000A.<\/code><\/p>\n<p>The Public Key in <strong>this type of encryption is, well, public<\/strong>. That means it\u2019s readily available to everyone and can be seen in a directory. The Private Key, however, <strong>belongs to the owner alone<\/strong>. Because of its complicated and mathematical nature, the encrypted data using a public key may only be <strong>decrypted by a compatible Private Key and vice versa<\/strong>.<\/p>\n<p>So, if <strong>Bob wants to text Alice something he doesn\u2019t want anyone to see<\/strong>, he will encrypt whatever that is using Alice\u2019s Public key and since only Alice has the access to her Private Key, she is the only person who is capable of <strong>decrypting the data back to its intended format<\/strong>.<\/p>\n<p>Since <strong>Alice is the only person who has the key to decrypt the data<\/strong>, it\u2019s only Alice who would be able to use it even if someone else gained access to the file. It will <strong>remain confidential as long as Alice doesn\u2019t share the Private Key<\/strong>.<\/p>\n<p>To put it simply, Private and Public Encryption is like putting your message inside a chest knowing that the person you are sending the message to is the <strong>only one in the world who has the key<\/strong>.<\/p>\n<h3>Why does it matter?<\/h3>\n<p>In the time we are living right now, information matters. There are many people who <strong>can use information to further their agenda<\/strong>. Governments can use information to protect its citizens or spy on its people, corporations can <strong>use information to feed us with advertisements<\/strong>, or to sell this products to us. And the more we, the causal users, produce these information, <strong>the more susceptible we are to these entities<\/strong>.<\/p>\n<h3>So why does it \u2018really\u2019 matter?<\/h3>\n<p>It matters because <strong>innovations in tech are bringing encryption closer to us<\/strong>. Gone are the days where if one wants his emails to be secure or private, one would <strong>employ difficult and complicated mathematical equations<\/strong> in order to encrypt them. That being said, it is now easier to secure our data and that is <strong>one good reason to take advantage of<\/strong>.<\/p>\n<p>It also matters because we need to <a href=\"https:\/\/www.hongkiat.com\/blog\/safeguard-online-privacy\/\">safeguard our online privacy<\/a>. Sure, you may think that it is practically harmless for you to open your data to anyone, but it really is not. The reality is, <strong>online security doesn\u2019t only lie in emails or text<\/strong> messages, it encompasses banking, financial, and medical records. This data is sensitive because <strong>it could spell out huge differences in our lives<\/strong>, and if it falls into the wrong hands, we could be in for a lot of trouble.<\/p>\n<p>Lastly, it matters because sooner or later, <strong>we all would have something to hide<\/strong>. You may not think it to be possible but it would happen. The real power of encryption and privacy lies in its ability to protect the public. If privacy is absent, <strong>democracy and good governance cannot exist<\/strong>.<\/p>\n<h3>A concluding look at the matter<\/h3>\n<p>Though <strong>encryption may sound complicated, and even daunting<\/strong>, it is, however, necessary. The world is not of unicorns and rainbows and there are <strong>people who are itching to get every bit of information possible<\/strong> and they will go leaps and bounds just to get it. That\u2019s why you build a fence when there is a threat from bandits.<\/p>\n<p><strong>You wouldn\u2019t want anyone listening to your conversations<\/strong>, or maybe reading private messages, would you? So what would you do? Leave the door open? Or bolt it so no one could enter?<\/p>\n<p class=\"recommended_top\">\n\t\t\t\t\t<strong>Read Also:<\/strong>\u00a0\n\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/crypto-apps-protect-online-privacy\/\">9 Free Privacy Apps Against Surveillance & Censorship<\/a>\n\t\t\t\t<\/p>","protected":false},"excerpt":{"rendered":"<p>You are being watched. Governments around the world have secret systems that spy on their citizens every hour of every day. These systems were designed to protect people from threats of international and domestic terrorism, but since they are run by humans, they tend to be used inappropriately too, like this National Security Agency employee&hellip;<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3398],"tags":[925,4605,4601],"topic":[4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Encryption - What You Need to Know - Hongkiat<\/title>\n<meta name=\"description\" content=\"You are being watched. Governments around the world have secret systems that spy on their citizens every hour of every day. These systems were designed to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Encryption - What You Need to Know\" \/>\n<meta property=\"og:description\" content=\"You are being watched. Governments around the world have secret systems that spy on their citizens every hour of every day. These systems were designed to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-27T13:01:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-28T12:36:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/surveillance.jpg\" \/>\n<meta name=\"author\" content=\"Rean\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rean\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/\"},\"author\":{\"name\":\"Rean\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/9055cf045c2ed578773e8a4e184ba621\"},\"headline\":\"Data Encryption &#8211; What You Need to Know\",\"datePublished\":\"2017-02-27T13:01:23+00:00\",\"dateModified\":\"2022-06-28T12:36:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/\"},\"wordCount\":1235,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/encryption-what-you-need-to-know\\\/surveillance.jpg\",\"keywords\":[\"Data Encryption\",\"Internet Security and Privacy\",\"Security and Privacy\"],\"articleSection\":[\"Internet\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/\",\"name\":\"Data Encryption - What You Need to Know - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/encryption-what-you-need-to-know\\\/surveillance.jpg\",\"datePublished\":\"2017-02-27T13:01:23+00:00\",\"dateModified\":\"2022-06-28T12:36:53+00:00\",\"description\":\"You are being watched. Governments around the world have secret systems that spy on their citizens every hour of every day. These systems were designed to\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/encryption-what-you-need-to-know\\\/surveillance.jpg\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/encryption-what-you-need-to-know\\\/surveillance.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/encryption-what-you-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Encryption &#8211; What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/9055cf045c2ed578773e8a4e184ba621\",\"name\":\"Rean\",\"description\":\"Rean is an operations specialist, growth hacker, and a consultant specializing in remote team setup and management.\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/rean\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Encryption - What You Need to Know - Hongkiat","description":"You are being watched. Governments around the world have secret systems that spy on their citizens every hour of every day. These systems were designed to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Data Encryption - What You Need to Know","og_description":"You are being watched. Governments around the world have secret systems that spy on their citizens every hour of every day. These systems were designed to","og_url":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2017-02-27T13:01:23+00:00","article_modified_time":"2022-06-28T12:36:53+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/surveillance.jpg","type":"","width":"","height":""}],"author":"Rean","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Rean","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/"},"author":{"name":"Rean","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/9055cf045c2ed578773e8a4e184ba621"},"headline":"Data Encryption &#8211; What You Need to Know","datePublished":"2017-02-27T13:01:23+00:00","dateModified":"2022-06-28T12:36:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/"},"wordCount":1235,"commentCount":3,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/surveillance.jpg","keywords":["Data Encryption","Internet Security and Privacy","Security and Privacy"],"articleSection":["Internet"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/","url":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/","name":"Data Encryption - What You Need to Know - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/surveillance.jpg","datePublished":"2017-02-27T13:01:23+00:00","dateModified":"2022-06-28T12:36:53+00:00","description":"You are being watched. Governments around the world have secret systems that spy on their citizens every hour of every day. These systems were designed to","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/surveillance.jpg","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/encryption-what-you-need-to-know\/surveillance.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/encryption-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Encryption &#8211; What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/9055cf045c2ed578773e8a4e184ba621","name":"Rean","description":"Rean is an operations specialist, growth hacker, and a consultant specializing in remote team setup and management.","url":"https:\/\/www.hongkiat.com\/blog\/author\/rean\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-7D8","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/29334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=29334"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/29334\/revisions"}],"predecessor-version":[{"id":60160,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/29334\/revisions\/60160"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=29334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=29334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=29334"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=29334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}