this post was submitted on 21 Jan 2024
70 points (91.7% liked)

Privacy

32456 readers
692 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

disclaimer: I'm just asking to get understanding of the theory behind network traffic encryption, I know this doesn't happen irl most likely.

Let's take https connection for example. I like watching revolutionary things on youtube and do not wish for authorities to know what I am watching, we accept here for the sake of showcase that google won't sell my watch history if asked (LMAO what am I even saying?).
So if I'm not mistaken since youtube has https implemented, our communication is encrypted, the keys are shared only between me and youtube. But when Youtube shares the key with me/my client the first time, is that also encrypted? Wouldn't the same question keep getting answered until there is something unencrypted? I know this is a bit too much unlikely, but if ISP automated the process of gathering keys and decrypting web traffic for a certain site with them for all users, would that work for them?
I'm taking https here as an example, while I have the same question for like VPN.

EDIT: Thank you everybody. I am not a member of this community, but every comment was a golden experience to read!

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 11 months ago (2 children)

Asymetrical encryption solves this, here is my attempt to do an ELI5:

Adam want's to send a chat message to Ben, but want to do it securely, so they use a special program on their computers.

When the Adam's program first reaches out to Ben's computer, it asks for an unlocked padlock, this is a padlock that can only be unlocked by Ben's program.

Adam's program takes the padlock and crafts a new special series of padlocks that only Adam's program can unlock, which it put's in a box and locks it with Ben's padlock.

The box is sent to Ben's program, the program unlocks the box and creates it's own special series of padlocks that only Ben's program can unlock, put them in a box and locks it with Adam's padlocks.

The box is then sent to Adam's program, and is unlocked.

This now means that Adam's program can put messages to Ben in a box, lock the box with one of Ben's special padlocks and send it on it's way knowing that only Ben can unlock the box and read the message.

Likewise, Ben can also send messages in boxes locked with Adam's padlocks and know that only Adam can unlock them and read the message.

Added to this is the fact that messages from Ben can be verified as having used the special padlocks Adam sent to Ben, as else Adam's special key wouldn't fit the padlocks given to Ben.

In reality the padlocks are keys to lock a message, and the above text describe a secure key exchange.

[–] [email protected] 2 points 11 months ago* (last edited 11 months ago) (1 children)

Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can't read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can't figure out how to unlock it and decrypt the data)?

[–] [email protected] 2 points 11 months ago (1 children)

Yep, if a thrid party gets the padlock they can lock the box, but can't unlock other boxes

[–] [email protected] 3 points 11 months ago

Thank you! extremely helpful answer