Skip to main content

Want to encrypt your way past the NSA? Good luck with that

NSA-pixelatedI’m smart, right? I’m technology-savvy. Hell, you might even call me an expert on some of this crap. But none of those descriptors seemed to matter when I dipped my toes into the murky pool of encryption – the one and only technology that promises to keep out the NSA – or at least slow it down – besides, apparently, typewriters.

While many of you may claim to have nothing to hide, I actually did – well, I thought I did anyway. I am currently working on a story that involves passing along some potentially sensitive information with some pathologically privacy-minded individuals. Through the course of my reporting, one of my contacts requested that we communicate via encrypted email, using an encryption standard known as PGP, or Pretty Good Privacy. Great, I said. Let me just figure that out real quick and I’ll get right back to you.

Wrong! Turns out, using PGP is more complicated than building a national park on the Moon.

Cryptography is necessarily complex – if it weren’t, it wouldn’t be secure.

The original PGP encryption software is now owned by Symantec, which has the audacity to charge money for its product. Lucky for me, a number of open-source options are available. Do a few Google searches, and you’ll find yourself at the home of Gnu Privacy Guard (GPG), which has released versions of OpenPGP software for both Microsoft Windows and Apple OS X machines.

As a Mac user, I opted for GPGTools. The download is straightforward.  The creators were even kind enough to provide a handy tutorial for how to get started – one of the few PGP tutorials not written exclusively for computer geniuses with Asperger’s.

PGP basically works like this: A piece of software (in my case, GPGTools) generates two PGP encryption keys. One of these keys you keep private. The other, your “public key,” you share with whomever you want to send secret messages.

This sharing of keys is where things start to get overly complicated. Most people who use PGP upload their public key to a key exchange, which makes your key searchable (as long as the person doing the searching knows what you’ve named yourself on the the key exchange). Or you can share you public key some other secure way – snail mail, maybe? Carrier pigeon? Long-range ballistic missile? Maybe you could just meet up in the basement of some parking garage, Deep-Throat style. The possibilities here are virtually endless – and they all kind of suck.

To send your friend an encrypted email, you use his public key to encrypt the message. He then decrypts the message with his private key. For him to send you an encrypted message, he uses your public key to encrypt, and you decrypt with your private key. Are you still with me?

Or you can share you public key some other secure way – snail mail, maybe? Carrier pigeon? Long-range ballistic missile?

Well, it doesn’t matter because that’s about as far as I got. GPGTools seems to act as a kind of plugin for Apple’s Mail app. Which, from what I could decipher, enables a couple of buttons in Mail to now do, um, something that they didn’t before. But I still have yet to figure out how to successfully encrypt or decrypt an email using the software. 

Now, there are some more user-friendly options out there. The Mailvelope plugin, for example, is actually a bit easier to use than GPGTools, but still comes with all the other complications inherent with PGP. Another option, SecureGmail, is a simple-as-pie browser plugin for Chrome or iOS. But it uses something called symmetric encryption (as opposed to PGP, which is a form of asymmetric encryption), and relies on you to come up with a quality password to protect your emails – something we all know ain’t gonna cut it – and then to share that password with your contacts in a way that makes the whole exercise futile.

None of my bickering is meant to dog on the clearly brilliant minds working to build these encryption tools. Cryptography is necessarily complex – if it weren’t, it wouldn’t be secure. But using it needn’t give you an aneurism. Fortunately for the rest of us, there are people currently working very hard to solve the usability problem, including the teams behind the plugins listed above, The Pirate Bay guys behind the new Heml.is app, and many others.

Until these developers get it right, most people just won’t go through the trouble of figuring this stuff out – especially since encrypting your communications can reportedly make you more of a target for the NSA. That’s not to say doing so is an impossible riddle or not worth the effort – strong encryption really is the best option we have. But the barrier to entry here is some “Game of Thrones”-level nonsense.

At the end of the day, my contact and I just decided to talk on the phone – what he had to tell me was far less sensitive than he first made it out to be. So, theoretically, anyone could have listened. I can only hope that I have this PGP thing figured out by the time I actually have something to hide.

Editors' Recommendations

Topics
Andrew Couts
Former Digital Trends Contributor
Features Editor for Digital Trends, Andrew Couts covers a wide swath of consumer technology topics, with particular focus on…
How to enable picture-in-picture for YouTube on your Mac
Macbook Air

If you want to have a bit of music playing in the background or want to have your favorite YouTube video running in the corner of your screen, then the picture-in-picture YouTube feature needs to be on your radar. This allows you to turn your YouTube videos into a tiny pop-up window that can be moved and repositioned around your screen.

Mac users have several ways to activate the feature, including support on both Safari and Google Chrome. There's also a nifty Chrome extension that simplifies the task to a single button press. Here's a look at how to enable picture-in-picture for YouTube on your Mac.

Read more
How to change your Gmail password
pilot testing drivers licenses internet rolls two us states password

Changing your Gmail password is incredibly important for your online security. If you're anything like the average user, your Gmail account is linked to dozens of other organizations and programs – and if your account gets hacked, there's no telling what sort of damage can be done.

Because of this, it's crucial to change your Gmail password at regular intervals. Google makes this a rather painless process, and it should take no more than a few seconds from start to finish.

Read more
Best Buy deals: Save on laptops, TVs, appliances, and more
best buy shuts down insignia line smart home products store 2 768x768

Best Buy is always a great retailer to turn to if you’re looking for some savings. There are almost always Best Buy deals taking place on TVs, appliances, and devices we use to navigate the digital world. In fact, right now at Best Buy you can find some of the best TV deals, best laptop deals, and best phone deals that can be shopped, and we haven’t even mentioned the deals on tablets and home audio equipment currently taking place at Best Buy. We’ve rounded up all of the best Best Buy deals you can shop right now and categorized them for your convenience below, so read onward for some great opportunities to save.
Best Buy TV deals

There may be no better place to purchase one of the best TVs than Best Buy. There is almost always some huge savings to find on TVs at Best Buy, and that’s certainly the case right now. You’ll find deals top TV brands like Sony, Samsung, and LG, and more budget-friendly brands like TCL and Hisense are in play, too.

Read more