Tech Tip: How to Protect Communications through Encryption
2024-12-19
LRC
TXT
大字
小字
滚动
全页
1U.S. cybersecurity officials are advising people to use encryption in their communications after a major hacking campaign.
2Federal officials released a list of security suggestions for U.S. telecommunications companies that were targeted.
3The advice includes one suggestion that everyone can use: "Ensure that traffic is end-to-end encrypted to the maximum extent possible."
4End-to-end encryption, also known as E2EE, means that messages are protected so that only the sender and receiver can see them.
5If anyone else gets the message, all they will see is disordered information that cannot be understood without the key.
6Law enforcement officials had until now resisted encryption.
7This resistance is because the encryption means the technology companies themselves will not be able to look at the messages.
8In addition, the companies will not be able to respond to law enforcement requests to turn the data over.
9The Associated Press (AP) recently offered some ways that normal people can use for end-to-end encryption :
10Officials said the hackers targeted the metadata of a large number of people.
11That included information on the dates, times and recipients of calls and texts.
12The hackers also got to see the information from texts from a much smaller number of people.
13If you are an iPhone user, information in text messages that you send to someone else who also has an iPhone will be encrypted end-to-end.
14Look for the blue text bubbles which mean that the messages are encrypted iMessages.
15The same goes for Android users sending texts through Google Messages.
16There will be a lock next to the timestamp on each message to show that the encryption is on.
17But there is a weakness. When iPhone and Android users text each other, the messages are encrypted only using Rich Communication Services (RCS).
18That is a common method for messaging that has replaced the older SMS and MMS methods.
19Apple notes that RCS messages "aren't end-to-end encrypted, which means they're not protected from a third party reading them while they're sent between devices."
20Samsung, which sells Android smartphones, also indirectly described the issue in a small area at the bottom of a press release last month.
21Samsung said about RCS, "Encryption only available for Android-to-Android communication."
22To avoid getting caught out when exchanging texts, experts recommend using encrypted messaging apps.
23Privacy supporters are big fans of Signal, which uses end-to-end encryption on all messages and voice calls.
24Signal is an app that is run by an independent nonprofit group based in Mountainview, California.
25It promises never to sell customer data.
26The group has also made its source code publicly available so that it can be examined by anyone "for security and correctness."
27Signal's encryption method is so respected that it has been included into competitor WhatsApp.
28End-to-end encryption is also the normal mode for Facebook Messenger, which like WhatsApp is owned by Meta Platforms.
29Telegram is an app that can be used for one-on-one discussions, group chats and broadcast "channels."
30But Telegram does not use end-to-end encryption normally.
31Users have to turn on end-to-end encryption. And Telegram's end-to-end encryption does not work with group chats.
32Cybersecurity experts have warned people against using Telegram for private communications.
33Instead of using your phone to make calls through a wireless cellular network, you can make voice calls with Signal and WhatsApp.
34Both apps encrypt calls with the same technology that they use to encrypt messages.
35There are other choices. If you have an iPhone, you can use Facetime for calls, while Android owners can use the Google Fi service. Both are end-to-end encrypted.
36However, with all these choices, the person on the other end will also have to have the app.
37WhatsApp and Signal users can choose the privacy setting they want in the settings.
38Such choices include hiding an IP address during calls to prevent your general location from being guessed.
39I'm John Russell.
1U.S. cybersecurity officials are advising people to use encryption in their communications after a major hacking campaign. 2Federal officials released a list of security suggestions for U.S. telecommunications companies that were targeted. 3The advice includes one suggestion that everyone can use: "Ensure that traffic is end-to-end encrypted to the maximum extent possible." 4End-to-end encryption, also known as E2EE, means that messages are protected so that only the sender and receiver can see them. If anyone else gets the message, all they will see is disordered information that cannot be understood without the key. 5Law enforcement officials had until now resisted encryption. This resistance is because the encryption means the technology companies themselves will not be able to look at the messages. In addition, the companies will not be able to respond to law enforcement requests to turn the data over. 6The Associated Press (AP) recently offered some ways that normal people can use for end-to-end encryption : 7Texting 8Officials said the hackers targeted the metadata of a large number of people. That included information on the dates, times and recipients of calls and texts. The hackers also got to see the information from texts from a much smaller number of people. 9If you are an iPhone user, information in text messages that you send to someone else who also has an iPhone will be encrypted end-to-end. Look for the blue text bubbles which mean that the messages are encrypted iMessages. 10The same goes for Android users sending texts through Google Messages. There will be a lock next to the timestamp on each message to show that the encryption is on. 11But there is a weakness. When iPhone and Android users text each other, the messages are encrypted only using Rich Communication Services (RCS). That is a common method for messaging that has replaced the older SMS and MMS methods. 12Apple notes that RCS messages "aren't end-to-end encrypted, which means they're not protected from a third party reading them while they're sent between devices." 13Samsung, which sells Android smartphones, also indirectly described the issue in a small area at the bottom of a press release last month. Samsung said about RCS, "Encryption only available for Android-to-Android communication." 14Chat apps 15To avoid getting caught out when exchanging texts, experts recommend using encrypted messaging apps. 16Privacy supporters are big fans of Signal, which uses end-to-end encryption on all messages and voice calls. Signal is an app that is run by an independent nonprofit group based in Mountainview, California. It promises never to sell customer data. The group has also made its source code publicly available so that it can be examined by anyone "for security and correctness." 17Signal's encryption method is so respected that it has been included into competitor WhatsApp. 18End-to-end encryption is also the normal mode for Facebook Messenger, which like WhatsApp is owned by Meta Platforms. 19What about Telegram? 20Telegram is an app that can be used for one-on-one discussions, group chats and broadcast "channels." But Telegram does not use end-to-end encryption normally. Users have to turn on end-to-end encryption. And Telegram's end-to-end encryption does not work with group chats. 21Cybersecurity experts have warned people against using Telegram for private communications. 22Making calls 23Instead of using your phone to make calls through a wireless cellular network, you can make voice calls with Signal and WhatsApp. Both apps encrypt calls with the same technology that they use to encrypt messages. 24There are other choices. If you have an iPhone, you can use Facetime for calls, while Android owners can use the Google Fi service. Both are end-to-end encrypted. 25However, with all these choices, the person on the other end will also have to have the app. 26WhatsApp and Signal users can choose the privacy setting they want in the settings. Such choices include hiding an IP address during calls to prevent your general location from being guessed. 27I'm John Russell. 28Kelvin Chan reported on this story for the Associated Press. John Russell adapted it for VOA Learning English. 29______________________________________________ 30Words in This Story 31encryption - n. changing something (such as data) into a code 32hack - v. to gain illegal access to a computer network, computer system, phone, etc. 33extent - n. a degree, point, or limit to which something goes to 34key -n. information that permits a computer application to un-encrypt a message permitting the receiver to read it 35metadata -- n. data that gives information about other data 36recipient - n. someone who receives something 37text (message) -n. a short message sent through a computer program from one person to another which can contain a written message, links or pictures 38app (application) -n. a computer program that is designed to do one task or several linked tasks