Privacy is a big topic, and it ties into encryption.
Our data, from the news sites we visit to our social media and purchases, is tracked and cataloged. This data is sometimes compiled from different sources to create profiles for each user. Most of the time, this information is provided by non-voluntary measures; however, sometimes, we offer it even if it's not required.
Maybe you're thinking a VPN could block some of this tracking, or a DNS service could help. It could help a bit, but tracking now is so sophisticated that it's unclear how much that moves the needle. Your credit card transactions will work against you, and the amount of things required to do business on the Internet will likely create a trail that's hard to shake.
With every data breach, more of our data is leaked: name, address, phone number, age, gender, and email. Other data points often collected are ethnicity, income level, voting registration, and occupation. This amount of information, pieced together from various breaches, could be used maliciously — in the same way advertisers target us using this data, hackers are likely doing the same.
How Do We Prevent This?
We can't. Too many companies collect our data. There are companies neither of us has heard of that have profiles on us and everyone we know. These profiles are used for split-second advertising auctions that determine the ad you see — or even the commercial on your streaming service.
Since we can't stop it, what can we do? Good IT practices are required to secure data, but most importantly, data must be handled carefully — specifically encrypted. That means it's only readable with a second factor (usually a key) to decrypt it, whether in transit or at rest. If a hacker steals encrypted data and can't obtain the key, that data is useless to them.
Regulatory Frameworks
Compliance requirements create the frameworks needed to protect data. PCI requires audits for companies processing credit card transactions. GDPR and NIS 2 address data collection for Europeans and create requirements for storing and deleting user data. FedRAMP covers cloud-based government contractors. Most companies collecting data on US citizens, however, face few regulations today.
Why Encryption is Good
Encryption ensures confidentiality and integrity. It renders data unreadable outside the intended parties. It applies in two scenarios:
- At rest — stored data, like a network share drive or SharePoint.
- In transit — moving data, like credit card transactions.
Now imagine if the government wanted a backdoor in encryption standards. Every financial transaction — from Amazon to FanDuel — must be encrypted to prevent snooping. A backdoor in the encryption protocol would shake confidence in every online transaction. Any security professional understands the CIA triad: confidentiality, integrity, and availability. An encryption protocol with a back door is simply not secure.
The next time you bet on FanDuel or make a purchase on Amazon, consider how much you're counting on your information being encrypted securely.
Without encryption, online transactions would not be possible. Please think twice before assuming encryption is a bad thing.
Instagram: