1 00:00:01,710 --> 00:00:08,680 End to end encryption happens when the data is encrypted by the sender and only decrypted by the recipient. 2 00:00:08,870 --> 00:00:15,690 This is a desired form encryption for data in transit for maximum protection of the data. 3 00:00:15,900 --> 00:00:23,400 If you wish to avoid tracking global mass surveillance hackers and so on the use of HTP security on 4 00:00:23,430 --> 00:00:29,620 all web sites is becoming increasingly important regardless of the type of data that is being sent. 5 00:00:29,850 --> 00:00:36,420 As we go into more details on how tracking mass surveillance and browser hacking happens you will understand 6 00:00:36,420 --> 00:00:39,660 more and more the importance of encryption. 7 00:00:39,750 --> 00:00:49,040 Examples of encryption technology includes things like PGE P S MIME o TR which is off the record or 8 00:00:49,050 --> 00:00:56,770 Zed or TR which is zed in real time transport protocol as well as SSL and TLR. 9 00:00:56,820 --> 00:01:04,740 Implemented in the right way those can be and and companies that develop software that use and encryption 10 00:01:04,860 --> 00:01:11,150 and zero knowledge systems cannot reveal the details of the communication to your adversary. 11 00:01:11,280 --> 00:01:14,370 Even if coerced even if they wanted to. 12 00:01:14,370 --> 00:01:19,390 That is the benefit of encryption with zero knowledge. 13 00:01:19,590 --> 00:01:26,610 Examples of this type of software throughout the course but Examples include the messaging software 14 00:01:26,760 --> 00:01:31,450 signal chat secure crypto care and others. 15 00:01:31,470 --> 00:01:37,560 If everyone used and encryption for all traffic everyone's traffic would look the same when only some 16 00:01:37,560 --> 00:01:39,540 people use N10 encryption. 17 00:01:39,540 --> 00:01:46,210 Those people that use it into an encryption standard is different and encryption offers protection in 18 00:01:46,220 --> 00:01:50,180 transit but obviously does not offer protection for data. 19 00:01:50,270 --> 00:01:57,200 Once it is received you needed different protection mechanism to use and turn encryption wherever possible.