Skip to content
This repository has been archived by the owner on Dec 22, 2024. It is now read-only.

Commit

Permalink
update blog post, status: WIP
Browse files Browse the repository at this point in the history
  • Loading branch information
abuturabofficial committed Dec 7, 2023
1 parent 46ab63b commit f6647a7
Showing 1 changed file with 31 additions and 10 deletions.
41 changes: 31 additions & 10 deletions _posts/2023-12-05-digital-privacy-a-horror-story.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Is privacy totally lost, or is this blog title merely clickbait? I won't claim i

The advent of Web 2.0 was based on the generous free tiers offered to the consumers. But that freebie came at the cost of our digital life being exposed to those service providers. What we search on Google, what we watch on YouTube and TikTok, and how we interact with our social circle over on Facebook and Instagram, every step of ours is recorded. Then, with the help of complex algorithms, used to manipulate us through their ads. But the story doesn't end with the ads, our personal data is sold to the highest **3<sup>rd</sup> Party** bidders to make more profit off of it. Unfortunately, the story also doesn't end there, those e-vultures follow us around the web, keep hoarding more and more data about our online activities, and thus generating more profit by selling it. The collected data can be used to manipulate our thoughts and ideas in a particular direction as intended by the highest bidder. Facebook–Cambridge Analytica data scandal[^2] is a good example of how much dangerous a data collection can be, when used as a weapon of mass manipulation for specialized gains.

## Lack of Data Privacy took a toll on our Mental Health
## Lack of Data Privacy and Mental Health

Another danger of widespread data collection and its negative use is the toll on our mental health. Social media platforms (YouTube, Facebook, Twitter, TikTok, etc.), along with most major websites that serve any kind of content, as well as games, are designed to keep their users hooked by employing behavioral analysis[^4] and complex data analytics. For instance, when you open YouTube, the default page is the Home page rather than your subscription feed. This design encourages users to spend more time on the platform by suggesting videos based on their specific usage patterns on YouTube and other Google products in general. Additionally, when you click on a video, there is a recommended videos section on one side of the video playback, designed to further extend your stay on YouTube.

Expand All @@ -36,7 +36,7 @@ Another danger of widespread data collection and its negative use is the toll on

Even our communication privacy is largely at risk due to widespread use of WhatsApp, traditional SMS, iMessage, etc. Although WhatsApp, iMessage[^9] and few others proprietary messaging platforms claim to offer End-to-End Encryption (E2EE), where the sender and receiver are the only ones that can read each other messages. But due to their closed nature, we can't independently verify their claims. Are we comfortable to give those platform access to our chats with our loved ones? Are we willing to see ads based on our chats with our friends and family? I think nobody in their right mind will ever allow this.

> WhatsApp itself don't run any ads, but they do share metadata with their parent company, Meta (formerly Facebook). You will see some flowery language about it, like data sharing for enhanced user experience and improving the infrastructure etc…
> WhatsApp itself doesn't run any ads, but they do share metadata with their parent company, Meta (formerly Facebook). You will see some flowery language about it, like data sharing for enhanced user experience and improving the infrastructure etc…
{: .prompt-warning}

> iMessage cloud backups will only use E2EE, when you enable “Advanced Data Protection for iCloud[^8]”.
Expand All @@ -46,29 +46,43 @@ Even our communication privacy is largely at risk due to widespread use of Whats

Contrary to the widespread notion that Telegram is more private, it's by default even less private than WhatsApp due to no by-default E2EE. Telegram only uses E2EE when you use secret chat's feature. There is no E2EE in group chats, or default regular chats. Telegram uses their own encryption model instead of industry standard one. There are many other flaws[^6][^7] which will need the blog post of their own. When average users learn about privacy and see telegram mentioned as one of the ways to privately communicate with others, they don't bother to look further and start using it as is, thinking End-to-End Encryption is there by default.

## Email: A Risk
### Email: A Risk!

Email is another threat to our digital privacy, due to the sole nature of how in-secure an email protocol by-default is. It was designed to quickly and effectively deliver information, security of those send information wasn't the goal at that time. Likes of Gmail, Outlook etc., doesn't protect you with E2EE, instead use TLS (in-transit encryption of your emails, in which somebody listening on your network traffic or your ISP won't be able to make sense of them) to protect in-transit snooping of the emails. But hold the encryption keys themselves, in case of any government subpoena, or Server side hack, your private emails will be at the risk of exposure. Google and Microsoft being the encryption keyholders, they can read your emails, and serve you personalized ads based on it. There are other email provides like [ProtonMail](https://proton.me/mail), [Tuta](https://tuta.com/) and others, which provides different ways to encrypt your Email communications, but those have flaws[^11][^12] too, due to the constraints of being able to send email to non-encrypted Email providers, or complex nature of using PGP encryption for your emails, and no encryption for Email headers etc.
Email is another threat to our digital privacy, due to the sole nature of how in-secure an email protocol by-default is. It was designed to quickly and effectively deliver information, security of those send information wasn't the goal at that time. Likes of Gmail, Outlook etc., doesn't protect you with E2EE, instead use TLS (in-transit encryption of your emails, in which somebody listening on your network traffic or your ISP won't be able to make sense of them) to protect in-transit snooping of the emails. But hold the encryption keys themselves, in case of any government subpoena, or Server side hack, your private emails will be at the risk of exposure. Google and Microsoft being the encryption keyholders, they can read your emails, and serve you personalized ads based on it. There are other email provides like [ProtonMail](https://proton.me/mail), [Tuta](https://tuta.com/) (formerly Tutanota) and others, which provides different ways to encrypt your Email communications, but those have flaws[^11][^12] too, due to the constraints of being able to send email to non-encrypted Email providers, or complex nature of using PGP encryption for your emails, and no encryption for Email headers etc.

### ProtonMail and Tuta: Concerns about Encrypted Emails

ProtonMail and Tuta are some of the most popular encrypted email providers, but there is a catch.
ProtonMail and Tuta are some of the most popular encrypted email providers, but there is a catch. When a layman learns about the importance of privacy and security, he tends to migrate his Email to some privacy respecting EE2E email providers. Little does he know that, despite using those vendors, he is still at risk (arguably even more) of exposing his private information to the 3rd parties. As these email providers only offer E2EE when send and receiver, both are using the same provider (Proton or Tuta). For example, if you send an email from ProtonMail to Gmail or Outlook, though Proton will not able to see the content of your emails. But Gmail or Outlook having no compatible E2EE will easily be able to decipher your message.

Tuta E2EE method allow them to encrypt metadata like subject field, but ProtonMail due to S/MIME and PGP compatibility doesn't encrypt your email subject field. Both providers do provide password-protected emails for non Proton/Tuta email exchanges, but sharing those passwords with the receiver safely would need some other E2EE service.

> Tuta[^20] provides E2EE based on [AES-128](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) and [RSA-2048](https://en.wikipedia.org/wiki/RSA_(cryptosystem)). In contrast, ProtonMail[^21] uses [OpenGPG](https://www.openpgp.org/) and also supports compatibility with other email providers that use [PGP](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [S/MIME](https://en.wikipedia.org/wiki/S/MIME).
{: .prompt-tip}

## Privacy, Security, and Anonymity

We tend to mix up the concepts of privacy, security, and anonymity[^10]. Privacy is, you're the sole owner of your data, the concerned party provides you assurance that it will land in the wrong hands. While that concerned party proves really they are what they claim is security. Anonymity is the ability to surf or use the WWW, without giving up your personally identifiable information (PII). In the real world, anonymity is almost nonexistent (except when using a TOR Browser, still it's not guaranteed). Instead, what we want is the balance of all three. First we want is the privacy by having a minimal data collection, which is strictly needed to provide the desired service. Second, we want is the security of not only our data, but also insurance that the service provider is legit. Third, we ask for the anonymity of our collected data, from 3<sup>rd</sup> parties as well as other users of the same service.

### Misconception about Privacy and Security related to Open-Source Software
## <mark style="background: #FF5582A6;">Misconceptions about Open-Source Software</mark>



## Growing Governments' Intervention

The state of online privacy and security is deteriorating with the time due to increased surveillance[^13] and growing Governments' dislikes[^14] of the data encryption and privacy. Apart from the authoritarian states, this negative view of privacy, security, and encryption of individuals' data is seen as a national security risk. Governments are trying to deploy methods to decipher those encrypted communications and data in the name of avoiding terror threats.
The current landscape of online privacy and security is facing challenges due to increased surveillance[^13] and governmental opposition[^14][^17][^18] towards data encryption and privacy. Notably, governments, including the EU and UK, have made recent attempts[^15][^16] to compromise privacy under the guise of counterterrorism, crime prevention, and child protection. While the EU's GDPR is renowned for safeguarding individual privacy, there are concerns about a shift in approach with initiatives like the Chat Control Bill.

> There are so many examples when governments tried to weaken the End-to-End Encryption (EE2E), overall privacy and security for the masses. If I start listing all, the whole blog post will be needed only for those references.
{: .prompt-info}

These legislative efforts aim to implement unproven methods to scan end-to-end encrypted communications and data without infringing on individuals' right to privacy. <mark style="background: #BBFABBA6;">Currently, security and privacy advocates have successfully resisted the erosion of privacy rights, but the duration of their success in preventing the compromise of E2EE remains uncertain</mark>.

I see arguments against E2EE as comparable to installing cameras in everyone's homes in the name of national security and child protection. The idea that everyone could pose a threat doesn't justify intrusive surveillance. Governments and law enforcement should prioritize legitimate efforts rather than resorting to injecting spyware into devices. Both actions are not only wrong, but also unlawful, violating the fundamental human right to personal privacy. Intruding into personal devices is, in my opinion, even more invasive, as breaking E2EE opens the door for governments and potential threat actors to hack into ideas and manipulate opinions which is more dangerous than physical surveillance.

## Where we stand today!
## <mark style="background: #FF5582A6;">Where we stand today!</mark>

The Web 2.0 was built around the idea of collecting more and more data about its users, making profit off of it, instead of users paying for their services.
The Web 2.0 was built around the idea of collecting more and more data about its users, making profit off of it, instead of users paying for their services. The Governments are continuously trying to compromise[^19] our privacy and security by introducing invasive legislations. We need to be mindful of what we share online. The digital privacy and security comes at a cost:
- You need to make deliberate effort to ensure the service you're communicating with is legit.
-

## References
---
Expand All @@ -86,4 +100,11 @@ The Web 2.0 was built around the idea of collecting more and more data about its
[^11]: "Read more about Encrypted Email and Security Nihilism", May 18, 2018. [Check Out](https://www.aclu.org/news/privacy-technology/encrypted-email-and-security-nihilism) (Some parts of this article maybe outdated)
[^12]: Educate yourself about 7 Drawbacks of Encrypted Email, May 22, 2023. [Read More](https://www.consensus.com/blog/7-drawbacks-of-encrypted-email/)
[^13]: Dive into K. Zetter's piece on "How Edward Snowden Leaked the NSA's Dirty Surveillance Business", May 13, 2014. [Learn More](https://www.wired.com/2014/05/greenwald-no-place-to-hide/)
[^14]: "Why FBI don't like the encryption?" [Read FBI's Stance](https://www.fbi.gov/about/faqs/what-concerns-do-the-fbi-and-the-law-enforcement-communities-have-regarding-the-growing-use-of-encryption-products-by-the-public-both-domestically-and-abroad)
[^14]: "Why FBI don't like the encryption?" [Read FBI's Stance](https://www.fbi.gov/about/faqs/what-concerns-do-the-fbi-and-the-law-enforcement-communities-have-regarding-the-growing-use-of-encryption-products-by-the-public-both-domestically-and-abroad)
[^15]: "UK Government tried to undermine the privacy by breaking the end-to-end encryption", September 6, 2023. [Learn More](https://techcrunch.com/2023/09/06/osb-encryption-scanning-feasibility/)
[^16]: "EU attempt at introducing the Chat Control Bill to introduce client-side scanning of EE2E messages", September 14, 2023. [Educate yourself](https://proton.me/blog/eu-chat-control)
[^17]: "International joint statement to undermine the EE2E in the name of Public Safety", October 11, 2020. [Check it Out](https://www.justice.gov/opa/pr/international-statement-end-end-encryption-and-public-safety)
[^18]: A paper on "Encryption: A Tradeoff Between User Privacy and National Security", July 15, 2021. [Explore More](https://www.american.edu/sis/centers/security-technology/encryption.cfm)
[^19]: A piece on "The government wants access to your encrypted messages — we must act now to defend our right to privacy", July 6, 2023. [Read More](https://thehill.com/opinion/technology/4081907-the-government-wants-access-to-your-encrypted-messages-we-must-act-now-to-defend-our-right-to-privacy/)
[^20]: An FAQ about Tuta's Encryption Methodology, [Read More](https://tuta.com/support/#algorithms)
[^21]: A Explanation given by Proton about their E2EE, December 30, 2021. [Read the Blog](https://proton.me/support/proton-mail-encryption-explained)

0 comments on commit f6647a7

Please sign in to comment.