a mternet Society Fundamentals prograg & The Kenyan Chapter. — ny ft > a, Why Encryption Matters To Me. What’s encryption’? Encryption is the art of enc (coding and decoding) information. This involyes scrambling or enciph so that only/the target user gets the nto the term end-to-en tion. In our daily life, we rely on encryption in many aspects in achieving privacy in the digital Space. It is applied in almost all sectors, in the digital space from that of banking, cloud computing (iCloud, google drive, amazon etc.), communication-messaging (WhatsApp, Signal etc.)ponline shopping (Amazon, Alibaba, Jumia), nor daily browsing and even that of online streaming Yor als (ote How encryption works. li want to keep all ry messages confidential =agleig'{e)d(e)ami-m- mn 's's-)' ana e eel e-10010)(— elie) seat-1ele) ame ma al-) ae) alk i dont expect anyone to , 5 read my messages, other those with ‘keys can understand what is being shared. PASSA SRS ie ear —pleaselsiels Cipher Decryption Clear s a5 o =, e — <4! mechanism text 48\— @a'-18) 88 text —gleia'e).e)amaet-| <—-melre)gaat-lalelemeialiaig—iie||e) (mele) ail al- (eet 2-5-1] o)(—2 Someone can still access your data, Dut it appears meaningless. Marcus ju lbieat-bem wencastns e creation of a ‘new world’ — the ‘digital ists in the digital space. With the te and conduct various transactions The internet, for example, has | world’. there is a form of internet infra ture, people can commun without having to physically change their location. For example, in 2016, the United Nations Human Rights Council, while dealing with the promotion, protection and enjoyment of human rights onthe internet in its thirty-second session, observed that the ‘same rights that people have offline must also be protected online.’ Threats to encryption Threats to encryption is an attack on privacy and a violation of human rights. The threats come from all angles; the private sector, governments, businesses and individuals. a The _N Loe 8(0)<) MN 8) KO) 8101s a third- party to an encrypted communic , Key escrow-*excep access’ by law enforcement, “Machine inthe Middle” (MITM) attack (egsscropping). hacking software (Pegasus spyware). z= borescope . screwdriver wheel pack , ss SS Pros of encryption . It enables a near bulletproof ier from accessing data by all unauthorized intrusLons. .It ena pate Communication as the content. . Fosters personal security by keeping your identitysafe and hinders people from impersonating you and getting private data. . It’s the cornerstone of national security, by protecting the secrets of countries ended parties by the sender access and organizations. Encryption best practices This entails, a. Understanding the nee ong encryption by staying informed, infor sharing information and finally taking actions through joining han keeping it safe. b. Use of strong encryption across all platforms. C. Restricting third-party applications from the amount of data and access they have. d. Government policies to safeguard encryption. e, White hackers advancement in tech | protect and manage the constant changes and y. How to keep safe in the digital space. a) Only using end-to-end encrypt essaging applications such as WhatsApp and Sign etting encryption deta using devices and various online and ine b) Using strong and unique passwords and codes and always having additional security features such as two-factor verification (2FA) and erase-data options turned on to avoid prying eyes and black hat hackers accessing the data. c) Updating security features and universal updates to»be up to date. Software and nce realize britches and bugs imthe system, tend to | them through updates. This help safeguard privacy. application developer develop a solution a ao highlighted the manner in The discussion abo whiGltencryption is esse world./ It also important, as pointed out above, that or privacy in the digital discussions and solutions are_found for the threats facing encryption. (Co) ayar=rermr-laremilalarel om’ sisamantsmelap Email: vi aaliieclatelel@ucdnar-limeelan Whal<= t Mwando Twitter: Vin Vee larere. ~ (THANK END !!!