Encrypting personal communication

Statue outside the National Archives

Personal use of encrypted communication is yet another example of so-called ‘network effects.’ (These have been mentioned previously: 1, 2, 3.) The basic idea is that the more widespread certain technologies become, the more useful they are to everyone using them. The most commonly cited examples are telephones and fax machines; back when only a few people had them, they had limited utility. You would need alternative channels of communication and you would waste time deciding which one to use and exchanging instructions about that with other parties. Once telephones became ubiquitous, each one was a lot more powerful and convenient. The same can be said for email addresses.

Good free software exists that allows the encryption of emails at a level where it would challenge major organizations to read them. While this may not protect an individual message that falls under scrutiny, it changes the dynamic of the whole system. It is no longer possible to filter every email passing along a fibre-optic cable for certain keywords, for instance. You would need to crack every one of them first.

Making the transition to the routine use of encryption, however, requires more effort than the adoption of telephones or email. While those technologies were more convenient than their predecessors, encryption adds a layer of difficulty to communication. You need to have the required software, key pairs generated, and passphrases. It is possible to make mistakes and encrypt things such that you can never access them again.

As such, there is a double barrier to the adoption of widespread communication encryption: people must deal with the added difficulties involved in communicating in this way and with the problem that hardly anyone uses such systems now. If there is nobody out there with whom you can exchange PGP encrypted messages, you aren’t too likely to bother with acquiring and using the software. It is entirely possible that those two constraints will prevent widespread adoption for the foreseeable future.

One nice exception to this rule is Skype. Users may not know it, but calls made over Skype are transmitted in encryption form, very considerably increasing the difficulty of intercepting them. The fact that users do not know this is happening greatly increases the level of usage (you cannot avoid using it). While such systems may well not be as secure as explicit encryption efforts undertaken by senders and recipients, they may be a useful way to increase overall adoption of privacy technology. Such ‘invisible encryption’ could also be usefully incorporated into stores of personal data, such as the contents of GMail accounts.

PS. For anyone who decides to give PGP a try, my public key is available here.

Author: Milan

In the spring of 2005, I graduated from the University of British Columbia with a degree in International Relations and a general focus in the area of environmental politics. In the fall of 2005, I began reading for an M.Phil in IR at Wadham College, Oxford. Outside school, I am very interested in photography, writing, and the outdoors. I am writing this blog to keep in touch with friends and family around the world, provide a more personal view of graduate student life in Oxford, and pass on some lessons I've learned here.

12 thoughts on “Encrypting personal communication”

  1. Hey milan.

    Hows it going? I hope you have settled in really well? Ottawa is a lovely city once you get to know it. I highly recommend the war museum. I went there every year we went to the National Improv Finals.

    Anyways,

    I thought I would let you know a few things. One, I made a new music video for a song I really like by the Scissor Sisters. It is called Tits on the Radio and it is on my webpage.

    Secondly,

    I made a MOLSON CANADIAN promotional video with my friends, and much like the original Google Idol video contest, I am in the running to win $5000 dollars (all of which I would spend on school)

    It starts September 1st, and the voting is a ONE-VOTE-PER-DAY-PER-COMPUTER kind of deal. I sure hope I could win it.

    If you go on my facebook page, you can find a link to the video. Also you must join the facebook group “Molson Canadian Nation” to vote starting September 1st.

    I was hoping you could support once again, for the most important contest I have yet to enter. By the by, I got into the UBC film program.

    I will be making a short film this year.

    Hope you are doing well. Let me know if all of this makes sense.

    Cheers,

    Mica

  2. —–BEGIN PGP MESSAGE—–
    Version: PGP Desktop 9.0.6 – not licensed for commercial use: http://www.pgp.com

    qANQR1DBw04DzOjqEDOjmFIQD/0Tw9R3PBk7mbhy1QAIjedouHE76oiz54xKJR3x
    ZYC3SjLlRhGSoT+HFAWXJmlPQhFl0WSF/X7VAweimwqqGoMHkl4i7Orfn6Px+VjY
    eLSTty6Gma6qsunJNzaOhutCaTbpBl29ZiUIrkJn+UaMm38utnOVkMGVlbF3LluE
    rXLuTDKkwzwwpTlq7F2yVPKH6sfre9Cfh096YyxLfuqGJeng4GNCNIXl+cx/Mu34
    b+/k2XwS8iEHZoo1zlyTnKbU62i4ad/4QFDxqNcXtF4zEQw+uqjLOBOqUTONI4rW
    eF2f4jVItIW0d+0akNUxnGCqjWIa5yUMAnDes2w+bFrMp8oSTfumd+T4rC8fFYuq
    ZlsGRgaDtCrOQwAn0AYpssse/7kxzI80IVFI/ckEV1sE33u0+YUNyGit7Cw3Wn3l
    v185WLC+1U0bsLsiFZUN6khM45IZFJJmhGIwJYbE3uJ2TphC8NxsC0FdXIV2vCY8
    91PeZfT3CW7zHnou9rjamiwc2MjwIblfdLoxnjO0VBz11bt3YLm0nmPm5ye78Y+j
    Sf7JSsLqXblkCwgQOXuS/KnQPuh067/rtuwZkXdKwfGwkO5eY0zev16RRRNAYyFt
    eolKS3xQBTyg0WAMRdI2wvsNyI/jsLMX2g9w/0VVr9c7Kket6eMLDWTOxEPP3fzy
    rycJUA//Q0PorEZQTjhDEVl6+a14BYU83OHVYkuYozMEaOtBxcNd2/sY9kkJ7cgz
    BfWRyaN9Iedr/QAWUe9v3FPuxt94OtjsWBCaF4sskI8q+HpNCi5HnV9vw5t3Bi1w
    AaNr12MrR+mYG94BuRAH5yDm0fdOB28bezV8gmjmAGfSdV7E8muQf+YjbnUj+yBe
    YgbUt9FiLqOH8583148d8wnm+yAi5zeU+igLRFoAR4O7JCIxOTD339EfqV88NUor
    aVje+QmsPzZeodGqxH+wToejUHqd+yIY6XadF4oF8GYuTnAWmbSXuhpg2+DI3jk/
    1RZKy9gxAvXdbcne9z3Lw6j+W6XqnhsVj3ueiihPVdgDOU2nle0zvMWzv1fGDFR0
    7gibc/XN7+yx4TLKzsD4GcgjhWr08QSwOj5D716kkQc329zKxHk0t2jazWDXWR6N
    veFCyry3+zSmzGj6N7gquYrtr/6XpaQFE/0cBEWu9u8PeDMkiK40if2dEkACm+oy
    VmSlhBShbYyDLnIHOYWLdOfyYKPxLqBLbIAE4QL1bkhWpYKhKu84NZESiIEBLLDo
    O9MI0e6O2ia689VngezkKQWIrj2ULlbjtRGG/3HzA0rxIeLszYQr7R0g1fhs9v8R
    Y4p+xbmn8xSNWPd79/Z079cvOjD36xI0sqOjznrfhS3nhigEAmTSdgFtrevvBEzw
    cLegCOwmsoZmODooQd9gfSDQ/x+84a6B8ql4xnRm0RndSYggdF/Isgj3vVfNX4tK
    qidfJoZGmiMe0eB8JMAYQwr0TMfW4gmJEPi/ti8blVcWskWZe7E3Frvv+jeDdNoj
    s5V4ITXotQbHVcUv6DY=
    =SVKx
    —–END PGP MESSAGE—–

  3. —–BEGIN PGP MESSAGE—–
    Version: PGP Desktop 9.0.6 – not licensed for commercial use: http://www.pgp.com

    qANQR1DBw04DzOjqEDOjmFIQD/4p7Q49h0WJQgmI8Gy0xiUgCxA+fIA0VC9RkbR7
    bamz4bCNOw04OJPMYOyUf5SaWpJy18lSxqwbkuGm9NfSzWQWrWBCnziSOOTapbzB
    DbYgUtGSpGMRbobCtR32nb0iUwR37OmgDyJ+0CCTI1IdxcydRM82SGd/uvOHtaEa
    t5F8a54KbT1La0xiIp1QmsRDElUVUhNly4XaIV6kktRmbjY1krcR4dkDfh22jJD9
    LSyklYGcanjngpPl+dWCfHI1cj+QZtbLqDHUvfvRO+DGFd6CRDb1uETLrKe9baUd
    gps9XwSmiJsf6INxvAwiwguSMAi6DoHOGWKTb8mLWuNxrFFSJ5AR2pnd64GtMUjm
    7VU8ztea0ZakDvYl5EtD4VvDsPR5PnDSXAquv4Dt9X1QYVbkKLUtoZjgX/7DwQNq
    rX+RqnrKrJP5THEGB4rC/e/7WNMexyagvPUGX2TUJ6cSsA07vxpa0SKRriuLErh+
    7fa9tVrRGAmMzG+98+GcFp7ggAz9F6/1HqBWQ1eJr2iCKKrKm05poa9R2MzZ3iqW
    ucikxmmNDVd7o9W8NONS7RQW1SvRQl/MzjHLbxAljaDRI2ZeYMZVQFlyRJmFbX2t
    zCw9ipC+DXruiJGKRC4CmgahPlSCJYGpMtj+OhTMgsvFkjCADZ5U/sVZ+jG9CcaQ
    iNTt3w//fVd8F0N41YgdgN5XFW+McNgY53ItYaQZuSQ0VOQpXRjOVeFoQb01pn5a
    7cGn+99+n9QidQVduyi9LsGsDp6Knj+eYKHvFovjpa/S0TFbvRzMtxW7LNfcHHV8
    Ch7+pDRHMebXOyIVrJftiky1wM65PZMh6lHwU/utPtjDM+rvyuKbYgDIZ0jTmha2
    E2VqfeQprqC8AKvO8QiXfzoqXDmG8/0f6APNR02xltgIBteal7cMgoCOF+JyIwDg
    /XyZAkOH83+I8gKWA2Wp620jZXeSGj4FY3RLXYmKu5VDEwEjxiaHi95Ld7T2sbkC
    epxqLC8VHRZacii1UVVf0nrYf4IFoY5f0xZg2vcjPNbCqkBnCsMiljTVV5cdIros
    nGfEVCo3rV96wvXJ0wxgXgtsVHPU7ElsjXt2SX9g/7oeE3tJhjvrB/d++DipBiAz
    IxxvsYiZ095JFRGeseMvTM4XXtAHw45Nxwkrqu8uobR5LIUCdGpAOBVZRrUetuL1
    yc6mVq8QyOdpFOVn5tBmJzOcqCO6A35HpUBWtkJ3TNaC39BC9BZEUrCKbmDm+2Qm
    zayjFtsMmGNHATqTApDvcdGjhTG08eEllVkjXRRLEDAUyzMHJWUuGkVm5h4Dw8I+
    HC4/KPt5UNbNt/bgZqLhUpqQ9dZZSo/hlhlBgJ50bBsqavSRJ8/SwNABLKJhuUpE
    roR/HMlZb32KUKtVuDaj+k3XMJsRIV1WQn/ZJos161KUl730IKTAPc7g0wiD/9p/
    8PVzkkqtMx9D7zdhUf1oVZW64tIZJmSNHVYKJBspy9Y8Zu1dlVdde5u16ZnREkRA
    q5MtxApX5Z1MlKJc7s44scvm+YWsolMZjVvshoQ2rFVvKoIRcB7gcyI9LWFgDiID
    Nz3ePdBrvzewO2zGoSHTl4vAImRJzN7mPTi2fl3eO6AB8ERtUBt9Swpy8X1KW3Yn
    d9AqC85AKgVgFJyDJt0fMETGr2iPzXweMEcbzvDLH6BNsYQjFWzPR6TEpyv595N5
    gx+mopaLlzG42vbMTz1K7E9g/VvyYRWZcBFSVLl6cOqY7/YAYVorNG2oNvmsUPmk
    J1K7BPqyFUsGOAZ9RL/vuPLN7gflBwG4XBgQTkS5EoJpSRhbsQMMerz88giVnjRW
    uxIaqFwYug9LTeDZLEwSEPSpgGdIPq1doHVgMqrOD/9LMlvDA+/sVs6aZNYLHUu0
    LqTOFP4O2xjH
    =x+cb
    —–END PGP MESSAGE—–

  4. —–BEGIN PGP MESSAGE—–
    Version: PGP Desktop 9.0.6 – not licensed for commercial use: http://www.pgp.com

    qANQR1DBw04DzOjqEDOjmFIQD/0ZY39Ne4TMy6g55FL614HTprsvO8L4tiv07XRC
    jQfTUrKtxZk0+vO91o9Po/Fk0So3if0P9CrDhwINljcmc/VbuV+d/3BHs+H4GpCs
    ld43dVpaczeyvZZi7ot+JBcPkzHH/WfrAKL9vEJqhyfSV/Y0KOv4kUzvxXLT9rJ0
    W/ZFR9YX32ow7fferTC7bryoK8jzCcZwqyb28+dsAmReWNCyx/nl0XECGbo09Vv0
    EDx/exihcOgvQi92akIQBHEA/nFp67TEjr/ADJYx81N4vElJkZyifqp1nEH5JryE
    SFXD4TYn5XJDT27qhMeTTRd51q6d6bmw/DMaaln4NOKVqzHcskwdHbWkMclJyE+O
    XzrK9KT7c7lbTQt5rZnehxtdcelWIHrOLIRqibC5ODoTjqbynABUoqtxOdj/EvCy
    4k1Kq/I9UF5NNw67A67u/pP+RWVjLQe577yywmRdiS8OX9RlhtmMz3Qt67e8R+46
    BYa0gbJuRMN0+HazNMps8AkHfxhmDVf6VV74tgN8Pfdhe1CkYezV7hG63rtNBGKG
    CpHz0P256Kv1WbH8iKPwfjUk0JdTWrwIPovokLppnATjRmJwenJmKxFjEVlIK9He
    F4a9W1BP854oHLiPq7EHpQJIm74XeGlwLpHfNIQ0V3e94f/wN8XdgFd+kVGrQBpd
    Aio56w//Syjl2bM9QRXz0uEKwjUgVNpB+zMRNmrUgJ6Ys0bfy3avRmYLEuuR86ho
    qd+MgXiv2um7xq7XuuSeTdrlbRAAVnPP1Bj8upF1aZ9bRgY36yPUvP/LPsdHupJg
    krwt9LG62fKaK6+H2yQ5mWBbRZkXZUSwzPnmhdoE2sH9PmST1TIF6QRTtNw1+JNX
    kFfXz6jYvPhvP5Sk6MVz24e6Erne4M/K2pxETGugox95pyBfi9q6t0kDqtvIaNs+
    opG9dXvkzjgATpPwnqM4rZ0m+uvTMBzOF+/lK1ZdG5lMh+bnSMv8O7H+cHDvdqBE
    CLN4wrK19NRsx+ecUhp5ie+YQNAROjPkobSSVSVOxuhitZRcPGSPq2WdHnGNR2PQ
    10lNlV5DfWB7ujoTRT4CpJPggyfyO/4ni8SMuKQcXvQ0aQyZ6LE3sB3qPh07o4Lz
    7EmdQMGNQe133vVPr6RGq03geVGY4fKk3fce3WHiMYDzdHphs//ANk5s37WgSRhg
    zOvU49KENExbCnUv5e0ruHE+oV9fGJThF6iaziNLOKPFvOrJEAW8H+I2P7QLxrdq
    f7GUMIU3EOd2tm2CFA3F9LqBRLkFz4OFmv0gmi1keqzHuqK92rjyvK6/CkhT6xy5
    bB01pHtoxQoMLgnXwF5SsK880uVDqAoIIWCbdJoKE2z7Id0h9RjSXwFI5aM5c5OI
    Ce/t4KYmtcXLKwJqJZlsWGEJU9BeLPsEgnn0K4caU7vyT5gjFD956ATDwTqb66VY
    DZa2+vD+dGWYjjtvcciU71tLh0ONK3JaKa1e0v2ZF8eK27UQtnNU
    =g5lv
    —–END PGP MESSAGE—–

  5. PGP (probably isn’t worth the trouble)

    The only reliable way to encrypt your email is PGP—also known as Pretty Good Privacy. However, PGP is incredibly obnoxious to use. Even PGP’s creator Phil Zimmermann has stopped using it, since he can’t use it on his phone. The problem isn’t just that you have to figure out PGP, everyone you talk to also has to figure it out. Telling someone to download Signal is a lot easier than walking them through public/private key encryption. This is where your threat model comes in handy, to help figure out if PGP is actually worth it to you.

    If you absolutely must use encrypted email, this guide to PGP might be helpful. It’s tricky, so you might want to go to a crypto party and have an activist or technologist help you set it up.

  6. If you don’t have the private key, and you don’t have the revoke certificate, then there is nothing you can do about the existing key.

    You should:

    Generate a new pair of keys
    Publish your new public key to a key server
    Let anyone who uses the old key know you have a new one
    Take the time to generate a revoke certificate and make and store backups.
    One option to mark the lost key as revoked on the key server is detailed in this answer here

Leave a Reply

Your email address will not be published. Required fields are marked *