{"id":12383,"date":"2020-08-10T01:21:00","date_gmt":"2020-08-10T05:21:00","guid":{"rendered":"https:\/\/www.shortform.com\/blog\/?p=12383"},"modified":"2020-08-21T14:35:29","modified_gmt":"2020-08-21T18:35:29","slug":"edward-snowden-encryption","status":"publish","type":"post","link":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/","title":{"rendered":"Snowden: Encryption Is Critical to Protect Your Privacy"},"content":{"rendered":"\n<p>What are Edward Snowden&#8217;s thoughts on encryption? How important is encryption to your security? How does encryption work?<\/p>\n\n\n\n<p>For Ed Snowden, encryption is an important security tool. He used encryption to protect his own files. Read more about Snowden, encryption, and privacy.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Edward Snowden: Encryption in Action<\/strong><\/h2>\n\n\n\n<p>Ed liked teaching and wanted to help the public defend itself against mass surveillance. For Snowden, encryption was critical. <strong>Even though he was leaking information about mass surveillance, he knew that wasn\u2019t going to be enough to allow people to retain their privacy. <\/strong>He taught a workshop on encryption. This was also practice for explaining things to a layperson\u2019s audience, which he\u2019d have to do when he blew the whistle. Many of the people who showed up weren\u2019t particularly worried about mass surveillance, they just wanted control over their privacy.<\/p>\n\n\n\n<p>Ed knew better than anyone that it\u2019s hard to be anonymous on the Internet. <strong>He got in touch with journalists using a variety of different identities and used encrypted email.<\/strong> He had to convince and\/or teach the journalists to use encryption too.&nbsp;<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is Encryption?<\/h3>\n\n\n\n<p><strong>Encryption is the only way to really protect yourself against surveillance<\/strong>. Think of encryption as a much more advanced version of a cipher. When you encrypt data, you\u2019re using a key to transform it into gibberish. Therefore, anyone trying to look at your data won\u2019t be able to make sense of it because they don\u2019t have the key.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Encryption algorithms are very complicated math problems\u2014problems so complicated even computers can\u2019t solve them. Usually, the longer an encryption key is, the safer it is, because the math is harder. <strong>The math and computing power required to break a 4096- or 8162-bit encryption key don\u2019t exist.<\/strong><\/p>\n\n\n\n<p>As a result, <strong>the government doesn\u2019t try to break the encryption, they go after the keys or the locksmiths:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>To go after the key, the government attacks the programs that do the encryption.&nbsp;<\/li><li>To keep keys safe, you can use a method called \u201czero knowledge.\u201d Zero knowledge involves encrypting data before you upload anything so that the key never leaves your computer.<\/li><li>To go after the locksmith, the government either forces companies who make tech to build weak encryption or tries to get international standards organizations to sign off on insecure algorithms.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Ed Uses Encryption to Facilitate Leak<\/h2>\n\n\n\n<p>For Snowden, encryption was critical to the whole process. Ed compressed and encrypted the documents and transferred them onto small SD cards. Then he smuggled the SD cards out of the NSA in his cheek, in his socks, or behind the panels of a Rubik\u2019s Cube.<br><\/p>\n\n\n\n<p>To get in touch with journalists anonymously, Ed drove around the island of Hawaii and connected to strangers\u2019 wifi connections. He used encrypted email and a computer that deleted everything he did on it every time it was shut down.  Ed decided to start with <a href=\"https:\/\/www.shortform.com\/blog\/glenn-greenwald-edward-snowden-laura-poitras\/\">Laura Poitras<\/a> and Glenn Greenwald, two journalists who were on the intelligence agencies\u2019 to-watch list.  <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What are Edward Snowden&#8217;s thoughts on encryption? How important is encryption to your security? How does encryption work? For Ed Snowden, encryption is an important security tool. He used encryption to protect his own files. Read more about Snowden, encryption, and privacy.<\/p>\n","protected":false},"author":6,"featured_media":12560,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[34,7],"tags":[116],"class_list":["post-12383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication","category-lifestyle","tag-permanent-record","","tg-column-two"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v24.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Snowden: Encryption Is Critical to Protect Your Privacy - Shortform Books<\/title>\n<meta name=\"description\" content=\"For Ed Snowden, encryption is an important security tool. He used encryption to protect his own files. Read more about Snowden, encryption, and privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Snowden: Encryption Is Critical to Protect Your Privacy\" \/>\n<meta property=\"og:description\" content=\"For Ed Snowden, encryption is an important security tool. He used encryption to protect his own files. Read more about Snowden, encryption, and privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"Shortform Books\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T05:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-21T18:35:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s3.amazonaws.com\/wordpress.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1189\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rina Shah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rina Shah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/\"},\"author\":{\"name\":\"Rina Shah\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/d07435826f13a8f422d5d333dceac287\"},\"headline\":\"Snowden: Encryption Is Critical to Protect Your Privacy\",\"datePublished\":\"2020-08-10T05:21:00+00:00\",\"dateModified\":\"2020-08-21T18:35:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/\"},\"wordCount\":517,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg\",\"keywords\":[\"Permanent Record\"],\"articleSection\":[\"Communication\",\"Lifestyle\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/\",\"url\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/\",\"name\":\"Snowden: Encryption Is Critical to Protect Your Privacy - Shortform Books\",\"isPartOf\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg\",\"datePublished\":\"2020-08-10T05:21:00+00:00\",\"dateModified\":\"2020-08-21T18:35:29+00:00\",\"description\":\"For Ed Snowden, encryption is an important security tool. He used encryption to protect his own files. Read more about Snowden, encryption, and privacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#primaryimage\",\"url\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg\",\"contentUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg\",\"width\":1189,\"height\":684},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.shortform.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Snowden: Encryption Is Critical to Protect Your Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#website\",\"url\":\"https:\/\/www.shortform.com\/blog\/\",\"name\":\"Shortform Books\",\"description\":\"The World&#039;s Best Book Summaries\",\"publisher\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.shortform.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\",\"name\":\"Shortform Books\",\"url\":\"https:\/\/www.shortform.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png\",\"contentUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png\",\"width\":500,\"height\":74,\"caption\":\"Shortform Books\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/d07435826f13a8f422d5d333dceac287\",\"name\":\"Rina Shah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/560b3bc3d51625f9becff4fded992607b156f274aa36bc07f8a4285a1d72cdc8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/560b3bc3d51625f9becff4fded992607b156f274aa36bc07f8a4285a1d72cdc8?s=96&d=mm&r=g\",\"caption\":\"Rina Shah\"},\"description\":\"An avid reader for as long as she can remember, Rina\u2019s love for books began with The Boxcar Children. Her penchant for always having a book nearby has never faded, though her reading tastes have since evolved. Rina reads around 100 books every year, with a fairly even split between fiction and non-fiction. Her favorite genres are memoirs, public health, and locked room mysteries. As an attorney, Rina can\u2019t help analyzing and deconstructing arguments in any book she reads.\",\"url\":\"https:\/\/www.shortform.com\/blog\/author\/rina\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Snowden: Encryption Is Critical to Protect Your Privacy - Shortform Books","description":"For Ed Snowden, encryption is an important security tool. He used encryption to protect his own files. Read more about Snowden, encryption, and privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Snowden: Encryption Is Critical to Protect Your Privacy","og_description":"For Ed Snowden, encryption is an important security tool. He used encryption to protect his own files. Read more about Snowden, encryption, and privacy.","og_url":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/","og_site_name":"Shortform Books","article_published_time":"2020-08-10T05:21:00+00:00","article_modified_time":"2020-08-21T18:35:29+00:00","og_image":[{"width":1189,"height":684,"url":"https:\/\/s3.amazonaws.com\/wordpress.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg","type":"image\/jpeg"}],"author":"Rina Shah","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rina Shah","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#article","isPartOf":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/"},"author":{"name":"Rina Shah","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/d07435826f13a8f422d5d333dceac287"},"headline":"Snowden: Encryption Is Critical to Protect Your Privacy","datePublished":"2020-08-10T05:21:00+00:00","dateModified":"2020-08-21T18:35:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/"},"wordCount":517,"commentCount":0,"publisher":{"@id":"https:\/\/www.shortform.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg","keywords":["Permanent Record"],"articleSection":["Communication","Lifestyle"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/","url":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/","name":"Snowden: Encryption Is Critical to Protect Your Privacy - Shortform Books","isPartOf":{"@id":"https:\/\/www.shortform.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg","datePublished":"2020-08-10T05:21:00+00:00","dateModified":"2020-08-21T18:35:29+00:00","description":"For Ed Snowden, encryption is an important security tool. He used encryption to protect his own files. Read more about Snowden, encryption, and privacy.","breadcrumb":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#primaryimage","url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg","contentUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg","width":1189,"height":684},{"@type":"BreadcrumbList","@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.shortform.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Snowden: Encryption Is Critical to Protect Your Privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.shortform.com\/blog\/#website","url":"https:\/\/www.shortform.com\/blog\/","name":"Shortform Books","description":"The World&#039;s Best Book Summaries","publisher":{"@id":"https:\/\/www.shortform.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.shortform.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.shortform.com\/blog\/#organization","name":"Shortform Books","url":"https:\/\/www.shortform.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png","contentUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png","width":500,"height":74,"caption":"Shortform Books"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/d07435826f13a8f422d5d333dceac287","name":"Rina Shah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/560b3bc3d51625f9becff4fded992607b156f274aa36bc07f8a4285a1d72cdc8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/560b3bc3d51625f9becff4fded992607b156f274aa36bc07f8a4285a1d72cdc8?s=96&d=mm&r=g","caption":"Rina Shah"},"description":"An avid reader for as long as she can remember, Rina\u2019s love for books began with The Boxcar Children. Her penchant for always having a book nearby has never faded, though her reading tastes have since evolved. Rina reads around 100 books every year, with a fairly even split between fiction and non-fiction. Her favorite genres are memoirs, public health, and locked room mysteries. As an attorney, Rina can\u2019t help analyzing and deconstructing arguments in any book she reads.","url":"https:\/\/www.shortform.com\/blog\/author\/rina\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-encryption.jpg","_links":{"self":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/12383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/comments?post=12383"}],"version-history":[{"count":8,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/12383\/revisions"}],"predecessor-version":[{"id":12904,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/12383\/revisions\/12904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/media\/12560"}],"wp:attachment":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/media?parent=12383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/categories?post=12383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/tags?post=12383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}