


{"id":19709,"date":"2024-01-24T04:24:11","date_gmt":"2024-01-23T22:54:11","guid":{"rendered":"https:\/\/vajiramandravi.com\/current-affairs\/?p=19709"},"modified":"2025-04-05T19:22:34","modified_gmt":"2025-04-05T13:52:34","slug":"end-to-end-encryption","status":"publish","type":"post","link":"https:\/\/vajiramandravi.com\/current-affairs\/end-to-end-encryption\/","title":{"rendered":"What is end-to-end encryption?"},"content":{"rendered":"<h2>About End-to-end encryption (E2EE)<\/h2>\n<ul>\n<li>Encryption is a\u00a0way of protecting data from unauthorised access or tampering.<\/li>\n<li>It works by transforming the data into a secret code that only the intended recipient can decipher. This comes in useful for various cases, such as securing online communications, storing sensitive information, and verifying digital identities.<\/li>\n<li>There are\u00a0two main types of encryption:\n<ul>\n<li>\u00a0Symmetric: It uses the\u00a0same key to encrypt and decrypt the data. In symmetric encryption, the key used to encrypt some information is also the key required to decrypt it.<\/li>\n<li>Asymmetric: It uses a pair of keys:\u00a0one public and one private. The public key can be shared with anyone, but the private key must be kept secret.<\/li>\n<\/ul>\n<\/li>\n<li>The term encryption is generally used when referring to the privacy of stored data, while end-to-end encryption protects data as it\u2019s\u00a0transferred between a location \u2013 which is crucial wherever there\u2019s a rapid exchange of information.<\/li>\n<li>In an E2EE-enabled app, only the person on each end \u2013 the sender and receiver \u2013 can read any exchanged messages.<\/li>\n<li>This is because messages get encrypted on your device before being sent and only are decrypted when they reach your intended recipient.<\/li>\n<\/ul>\n<h2>Issues with End-to-end encryption<\/h2>\n<ul>\n<li>Some\u00a0potent malware can also \u2018snoop\u2019 on your messages by infiltrating your device via other means \u2013 an SMS and reading them before they are encrypted.<\/li>\n<li>The company that installs E2E encryption on its products can\u00a0install a backdoor or an exception that allows the company to surmount the encryption and access the messages.<\/li>\n<\/ul>\n<hr \/>\n<h3>Q1) What is the Chameleon Trojan?<\/h3>\n<p>It is a malware that has the ability to disable biometric authentication methods, including fingerprint and face unlock, to sneakily access sensitive information.<\/p>\n<p><strong>Source:<\/strong> <a href=\"https:\/\/www.thehindu.com\/sci-tech\/science\/end-to-end-encryption-messaging-apps-explained\/article67765395.ece\" target=\"_blank\" rel=\"nofollow noopener\">What is end-to-end encryption? How does it secure information?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>End-to-end encryption  protects data as it\u2019s transferred between a location \u2013 which is crucial wherever there\u2019s a rapid exchange of information.<\/p>\n","protected":false},"author":5,"featured_media":19710,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-19709","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-upsc-prelims-current-affairs","8":"no-featured-image-padding"},"acf":[],"_links":{"self":[{"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/posts\/19709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/comments?post=19709"}],"version-history":[{"count":0,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/posts\/19709\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/media\/19710"}],"wp:attachment":[{"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/media?parent=19709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/categories?post=19709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/tags?post=19709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}