📆 23 Mar 2022 | ⏱️ 4 minute read

Encryption is a Timer, Not a Lock

Encryption is Not a Lock

Encryption is often explained as a lock. When you lock a safe with your valuables inside it, only yourself and the others who are granted access can unlock it. It’s not a perfect analogy. A determined thief can crack a safe. By contrast, as far as we know, it’s impossible to decrypt securely encrypted data without the key.

The lock analogy also breaks down in another way. When I think of an abstract lock, I imagine something that’s secure now and will be secure in the future. But encryption won’t necessarily be secure in the future. We could have Shor-capable quantum computers[1] soon or maybe mathematicians will figure out how to break cryptographic primitives[2].

Historically, cryptography has had an expiration date. There are reasons to think that trend won’t continue, but nobody knows the future for certain.

Encryption is a Timer

Locks are a fine way to explain to laypeople the basics of encryption. But for everybody else, I have a timer analogy which is more true to the facts I just presented.

This time, your safe uses a countdown timer controlled by a dial. When the time’s up, the safe opens, so you twist the dial as far back as it goes. The dial has no labels or markings, so you don’t know how long you have until time’s up and your safe unlocks, giving anyone access to your valuables.

Why The Distinction Matters

Why does this distinction even matter though? It only matters that encryption doesn’t last if there’s someone out there capturing encrypted internet traffic and waiting to decrypt it.

According to Edward Snowden, whistleblower of the U.S. National Security Agency’s illegal mass surveillance programs, NSA spent 80 million U.S. dollars trying to build a quantum computer that decrypts all internet traffic. See the research program Penetrating Hard Targets.

It would be naive to think NSA isn’t capturing encrypted internet traffic right now in hopes of one day decrypting it later.

What To Do About It

Security experts are quick to point out that the NSA doesn’t really need to decrypt our data. Metadata alone is sufficient for mass surveillance. They’re right, but if the actual contents of the data didn’t matter at all, they wouldn’t have spent money trying to build a quantum computer.

We all have a reason to resist mass surveillance[3], but how can we do that when NSA might be able to retroactively decrypt our internet activity in an unspecified length of time? Here’s my take:

Avoiding using the internet entirely isn’t practical nor desirable, but it can be practical to avoid the internet for things that really need to stay private. For instance, maybe you partake in certain activities/meetings that your current or possible future government wouldn’t approve of. You know the kind. If that’s you, you’d be wise to avoid using the internet for that.

I don’t care if you use Signal. How do you know for certain those messages won’t be decrypted in the future? Have your meetings in person, not online. Intelligence agencies aren’t made of magic. They cannot break secure protocols. But they will bug your hardware. They will use zero-day[4] exploits. And if you’re really interesting, they’ll use a brute force attack straight to your knees.

Have your private meetings in the middle of a field without any cell phones. Prefer in-person communication over PGP[5] or Signal. Prefer conducting private transactions with cash, not Monero[6]. Despite all of today’s fancy encryption, real life is still the most secure option.

And lastly, if you’ve spent so much time online that you’re unsure where to find Real Life, here’s a Wikipedia article to help you out:

🔗 What is Real Life?

Link(s):
🔗 1: Shor’s Algorithm
🔗 2: Cryptographic Primitive
🔗 3: Raising The Bar On Privacy
🔗 4: Zero-Day
🔗 5: Goodbye PGP
🔗 6: Warning to Monero Users