Hello,

We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not an Insider? Subscribe now for unlimited access to online articles.

Business Report

The Year of Encryption

Government spying gives a giant push to data scrambling on the Web.

In the future, every file crossing the Web may be encrypted.

Last summer, the world’s largest Internet companies learned they’d been hacked by the U.S. government.

Their answer for 2014: encrypt everything.

Over the last eight months, Yahoo encrypted its e-mail service and Google extended encryption to every search term that users enter. Microsoft said that by the end of this year it plans to encrypt all the data traveling to and from its networks. “Encryption on the Web is expanding enormously,” says Peter Eckersley, technology projects director at the Electronic Frontier Foundation (EFF), which grades companies on how well they do at protecting users’ privacy.

This story is part of our May/June 2014 Issue
See the rest of the issue
Subscribe

The EFF believes that within a few years, every file crossing the Internet could be protected with encryption, which uses mathematics to scramble and unscramble messages.

Encryption does not guarantee complete privacy—ciphers can be broken or compromised. But its widespread use could seriously hinder both cybercriminals and bulk collection of data by governments. That’s because even someone who is able to pilfer encrypted data can’t easily read it.

Encryption was already a rising trend, even before the spy scandal. Major security breaches have shown that computer networks are not safe from intruders. Last year, hackers stole millions of credit card numbers from Target and Neiman Marcus after finding clever ways to gain access to their systems.

“Today’s networks are like Swiss cheese. It’s very easy to get in, move laterally, and exfiltrate data,” says ­Dmitri A­lperovitch, cofounder of the security firm CrowdStrike. “People are using tools from the 1990s to do it.”

Encrypting data, like customers’ credit card information, is an additional line of defense. But encrypting stored data (as opposed to data in transit) turns out to pose a difficult puzzle. Encrypting the data protects it but also makes it difficult to search or process—rendering it less useful.

Encryption also takes up computer time, the main reason Web companies like Yahoo didn’t always use it before. But Internet firms realize they must now take extraordinary steps in response to extraordinary new threats.

Become an MIT Technology Review Insider for in-depth analysis and unparalleled perspective.

Subscribe today
Next in this Business Report
Spies, Technology, and Business

How the NSA eavesdropping scandal could balkanize the Internet or make it safer.

Want more award-winning journalism? Subscribe to Insider Plus.
  • Insider Plus {! insider.prices.plus !}*

    {! insider.display.menuOptionsLabel !}

    Everything included in Insider Basic, plus the digital magazine, extensive archive, ad-free web experience, and discounts to partner offerings and MIT Technology Review events.

    See details+

    Print + Digital Magazine (6 bi-monthly issues)

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

    Technology Review PDF magazine archive, including articles, images, and covers dating back to 1899

    10% Discount to MIT Technology Review events and MIT Press

    Ad-free website experience

/3
You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.