<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[end-to-end encryption - EteSync]]></title><description><![CDATA[EteSync, privacy, product updates and more...]]></description><link>https://blog.etesync.com/</link><image><url>https://blog.etesync.com/favicon.png</url><title>end-to-end encryption - EteSync</title><link>https://blog.etesync.com/</link></image><generator>Ghost 3.18</generator><lastBuildDate>Tue, 07 Apr 2026 08:51:09 GMT</lastBuildDate><atom:link href="https://blog.etesync.com/tag/end-to-end-encryption/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[End-to-End Encryption: What it is and Why it is Needed]]></title><description><![CDATA[End-to-end encryption is a system where the data is encrypted in a way that only the “ends” (users or their devices) can access the information, and no one else can.]]></description><link>https://blog.etesync.com/end-to-end-encryption-what-it-is-and-why-it-is-needed/</link><guid isPermaLink="false">5d6407cad7c4500001f2e653</guid><category><![CDATA[encryption]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[encryption at rest]]></category><category><![CDATA[encryption in transit]]></category><category><![CDATA[difference]]></category><category><![CDATA[end-to-end encryption]]></category><dc:creator><![CDATA[Tatjana Ristić]]></dc:creator><pubDate>Mon, 26 Aug 2019 16:51:34 GMT</pubDate><media:content url="https://blog.etesync.com/content/images/2019/08/kushagra-kevat-BJHN6Do8kjQ-unsplash-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.etesync.com/content/images/2019/08/kushagra-kevat-BJHN6Do8kjQ-unsplash-1.jpg" alt="End-to-End Encryption: What it is and Why it is Needed"><p>Encryption is the process of transforming data so only those who have access to the secret key can later decrypt it and retrieve it in its original form, called plaintext.</p><p>End-to-end encryption is a system where the data is encrypted in a way that only the “ends” (users or their devices) can access the information, and no one else can (people monitoring the network, hackers and not even the service provider). This is in contrast to how most encrypted services work, as we will show below.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.etesync.com/content/images/2019/09/-2-.png" class="kg-image" alt="End-to-End Encryption: What it is and Why it is Needed"><figcaption>Illustration of end-to-end encryption</figcaption></figure><p>In this example, Alice wants to send a private message to Bob saying: “Hey, Bob!”. Because she’s utilizing end-to-end encryption, her message is encrypted with a key only Bob can access. Since only Bob has access to the key, only Bob can retrieve the original data, and no one else can, not even the service provider.</p><h3 id="why-is-end-to-end-encryption-important">Why is End-to-End Encryption Important?</h3><p>The best way to understand why end-to-end encryption is important is to compare it with “regular encryption” (encryption in transit) where data is only encrypted while it’s in transit between the client, and the server can access it in plaintext.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.etesync.com/content/images/2019/09/without-e2e-1.png" class="kg-image" alt="End-to-End Encryption: What it is and Why it is Needed"><figcaption>Illustration of regular encryption</figcaption></figure><p>In this example, Alice is sending the same message as before but the data is now only encrypted in transit. This means that the data is encrypted by Alice, then decrypted by the server and encrypted again before being sent to Bob. Therefore, the company running the server has access to Alice’s message, as do all the company’s employees, hackers and other bad actors.</p><p>Similar is the case of services implementing encryption at rest. Encryption at rest is the process of encrypting the data before saving it to disk. Since the server has access to the data and the means to decrypt it, encryption at rest doesn’t add much value because it still leaves the data exposed to the server, employees, hackers and other bad actors.</p><p>All of these leaks are avoided when using end-to-end encrypted, where only Alice and Bob can access the message in plaintext. The server cannot access it, and neither can the people running it. Even if the server got hacked or improperly accessed, Alice’s information would be safe.</p><h3 id="closing-words">Closing Words</h3><p>With end-to-end encryption your data stays yours, and yours only. It’s therefore best to use services that employ end-to-end encryption and have it enabled by default (which is not always the case!). Even better, use open-source apps, where everyone can check the source code to verify that an app is as secure as it claims to be. That’s one of the reasons why EteSync is <a href="https://github.com/etesync/">open-source</a>.</p><p>But end-to-end is not the whole story, which is why at EteSync we take it one step further. More on that in a future post!<br></p><p>Follow us on <a href="https://mastodon.social/@EteSync">Mastodon</a>, <a href="https://twitter.com/EteSyncHQ">Twitter</a>, <a href="https://www.facebook.com/etesync">Facebook</a> or <a href="https://blog.etesync.com/rss/">RSS</a> for updates!<br><br></p><p>The image above uses modified icons by <a href="https://www.flaticon.com/authors/freepik">Freepik</a>, <a href="https://www.flaticon.com/authors/smashicons">Smashicons</a>, <a href="https://www.flaticon.com/authors/dave-gandy">Dave Gandy</a> and <a href="https://www.flaticon.com/authors/srip">srip</a> from <a href="https://www.flaticon.com/">flaticon.com</a> that are licensed under CC 3.0 BY.</p>]]></content:encoded></item><item><title><![CDATA[Metadata is Data!]]></title><description><![CDATA[End-to-end encryption protects your data so no one can access it other than you, therefore your data stays private. Though, even with end-to-end encryption, your metadata can still leak a lot of information about you.]]></description><link>https://blog.etesync.com/metadata-is-data/</link><guid isPermaLink="false">5d5270fb91289a0001365c09</guid><category><![CDATA[Privacy]]></category><category><![CDATA[end-to-end encryption]]></category><category><![CDATA[metadata]]></category><category><![CDATA[access pattern]]></category><category><![CDATA[ip address]]></category><category><![CDATA[social graph]]></category><category><![CDATA[usage volume]]></category><dc:creator><![CDATA[Tatjana Ristić]]></dc:creator><pubDate>Fri, 16 Aug 2019 13:08:52 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1453574503519-1ae2536262ec?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1453574503519-1ae2536262ec?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjExNzczfQ" alt="Metadata is Data!"><p>We love <a href="https://blog.etesync.com/end-to-end-encryption-what-it-is-and-why-it-is-needed/">end-to-end encryption</a> for a reason! It protects your data so no one can access it other than you, therefore it stays private. Though, even with end-to-end encryption, your metadata can still leak a lot of information about you.</p><p>Here are a few examples of what (personal) information metadata can leak:</p><h3 id="ip-address">IP Address</h3><p>By getting your Internet Protocol Address, the server gets plenty of information about you (<a href="https://www.infobyip.com/">these</a> are some examples), and the people running the server can then contact your service provider to know exactly who you are.</p><p>One popular way of preventing this is by using software such as<a href="https://www.torproject.org/"> Tor</a> or VPN to hide your origin.</p><h3 id="social-graph">Social Graph</h3><p>The social graph represents all of your social relations. One way messaging apps can create such a graph is by checking who you communicate with and who communicates with you. This means that even when using end-to-end encrypted messengers like<a href="https://signal.org/"> Signal</a>, the server can know who you know, and get information on people it didn’t even know existed just by the fact you have them on your contact list.</p><figure class="kg-card kg-image-card"><img src="https://blog.etesync.com/content/images/2019/08/1-1.jpg" class="kg-image" alt="Metadata is Data!"></figure><p>Let’s use the above graph as an example and assume that A is a journalist currently working with a group of dissidents (B, C and D) and an unrelated source (E). A, B and C have already been flagged by the government and are being specifically targeted. Even though D is not connected to the journalist, it’s easy to infer that D is a part of the group whose other members are in touch with the journalist, which makes D a person of interest. Source E becomes a target just by their association with the journalist. Until the journalist’s social graph leaked, the government didn't even know D and E existed.</p><p><a href="https://signal.org/blog/contact-discovery/">Here</a> is a post by Signal illustrating how hard this problem is to solve.</p><h3 id="access-patterns">Access Patterns</h3><p>Solely from the fact that we use certain data at a certain time, information on where we live, when we are at work, etc. can be deduced. What’s worse, accessing our data rarely and only at specific times can get us targeted.</p><figure class="kg-card kg-image-card"><img src="https://blog.etesync.com/content/images/2019/08/2-1.jpg" class="kg-image" alt="Metadata is Data!"></figure><p>In this example, A and D are, again, the journalist and the careful dissident. Even if the journalist’s social graph hadn't previously leaked, the dissident could have been flagged by the government because of their access pattern. The journalist (like most people) has their phone turned on at all times, while D mostly keeps their burner phone off to avoid being tracked. D turns on their phone only around 6 am, 10 am and 7 pm for short periods of time to talk to other dissidents. Because of the unusual access pattern, D sticks out and is easily identifiable as a person of interest.</p><p>Therefore you should be aware that sometimes even taking precautions, such as turning your phone off when you're not using it, can make you stick out.</p><h3 id="usage-volume">Usage Volume</h3><p>A good thing is that the leakage of metadata can also work in your favor, since the tracking entity also leaks metadata while tracking you. Just knowing the size of some content (even though it’s encrypted) can be enough to know whether you’re being tracked.</p><figure class="kg-card kg-image-card"><img src="https://blog.etesync.com/content/images/2019/08/3-2.jpg" class="kg-image" alt="Metadata is Data!"></figure><p>Imagine that the careful dissident D didn’t become a person of interest in the previous examples, but still has a hunch that they are being tracked. They assume that bugs are planted somewhere in the room. If they could listen to radio signals, even if encrypted, they would know whether they are tracked or not based on the amount of data being transmitted in the air. The signal would be very different in the case of a lot of noise and that of silence. The dissident can therefore test it by alternately being loud and silent, and then correlating their actions with the amount of data transmitted no matter the fact that they can’t access the data itself.</p><p>Using this method the dissident can at least establish whether they are being listened to or not.</p><h3 id="closing-words">Closing Words</h3><p>These are some of the ways in which metadata may indirectly leak private information. Just remember, the more everyone is cautious with their (meta)data, the less anyone sticks out and can get targeted.</p><p>That's why we also need more privacy respecting solutions that were designed from the ground up to protect user privacy!</p><p></p><p>Thanks to <a href="https://www.instagram.com/davidanakin.visuals/">David Anakin Visuals</a> for the graphics.</p><p>Text corrected thanks to <a href="https://www.reddit.com/user/mrkoot/">mrkoot</a> from Reddit.</p>]]></content:encoded></item></channel></rss>