Cracking The Code: Just How Does Encrypted Email Work? | WAMU 88.5 - American University Radio

Cracking The Code: Just How Does Encrypted Email Work?

Play associated audio

If the past few months have taught us anything, it's that everything we do online leaves a digital trail. While it may seem like there's not much we can do about it, there are some tech companies that are working to obscure that trail a little bit, with a process known as encryption.

Micah Lee, a staff technologist at the Electronic Frontier Foundation who recently wrote a document for the Freedom of the Press Foundation about the encryption process, explains it for Weekends on All Things Considered guest host Don Gonyea. Most of us use encryption in one form or another every day, Lee says, even if we don't realize it. For example, the little padlock symbol on your Internet browser is a version of encryption.

"You know, let's say you're paying a bill at a coffee shop or on some other open wireless network — it means that other people on that same network won't be able to spy on you," Lee says.

But sometimes you want to keep information private not just from outsiders, but also from the services you use.

"Let's say you are sending a private message to somebody," Lee explains. "Maybe, you don't want Facebook, for example, to know the contents of this private message."

In that case, you need to encrypt those messages yourself. So you would use software that jumbles the text, making it look like jibberish. And the person you're sending the message to decrypts it in order to read it.

"You actually have to send encrypted emails with other people who are also using encrypted email," Lee says.

Decrypting messages is tough to do for an outsider or a government, but setting it up is complicated too. It takes a long time and a fair amount of expertise to be able to set it up. And Lee says, "...There's a million things that could go wrong."

For example, someone could just hack directly into your computer and monitor every single key you hit, and even if your messages are private, you're still probably leaving digital information everywhere you go in ways you can't even imagine.

"Let's say that you check your Gmail account on your phone, and your phone checks it every 30 minutes. You're essentially letting Google know what your IP address is every 30 minutes," Lee explains. "And your IP address can loosely be mapped to your location...and so this means that Google just has this information about where you are all day long, all the time."

But though Google or other providers are able to collect this information, it doesn't necessarily mean that they are using that information.

And because this entire process is so complicated and overwhelming, most people don't take additional steps to keep their information private.

"The problem, I think, is that it's just very hard. So it's just the very dedicated nerds that are using it right now," says Lee.

But Lee hopes that one day, those dedicated nerds will be able to make encryption automatic for everyone.

Copyright 2013 NPR. To see more, visit http://www.npr.org/.

NPR

Filmed Over 12 Years, 'Boyhood' Follows A Kid's Coming Of Age

Writer-director Richard Linklater says picking the film's star was vital because he had to guess what he'd be like at 18. "I just went with a kid who seemed kind of the most interesting."
NPR

Alcohol Test: Does Eating Yeast Keep You From Getting Drunk?

When we read about a way to stave off intoxication in Esquire, we were dubious. So we bought a breathylzer, a few IPAs and tested out the kooky theory.
NPR

Signs Emerge Of A Compromise On Obama's $3.7B Immmigration Request

The president wants the money to deal with the thousands of minors from Central America who have crossed into the U.S. Republicans said they want some policy changes; Democrats aren't opposed.
NPR

A New Device Lets You Track Your Preschooler ... And Listen In

LG's KizON wristband lets you keep tabs on your child. But some experts say such devices send the wrong message about the world we live in. And the gadgets raise questions about kids' privacy rights.

Leave a Comment

Help keep the conversation civil. Please refer to our Terms of Use and Code of Conduct before posting your comments.