在线英语听力室

VOA科学技术2024--Tech Tip: How to Protect Communications through Encryption

时间:2025-01-22 07:49:11

搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。

(单词翻译)

U.S. cybersecurity officials are advising people to use encryption in their communications after a major hacking2 campaign.

Federal officials released a list of security suggestions for U.S. telecommunications companies that were targeted.

The advice includes one suggestion that everyone can use: "Ensure that traffic is end-to-end encrypted to the maximum extent possible."

End-to-end encryption, also known as E2EE, means that messages are protected so that only the sender and receiver can see them. If anyone else gets the message, all they will see is disordered information that cannot be understood without the key.

Law enforcement officials had until now resisted encryption. This resistance is because the encryption means the technology companies themselves will not be able to look at the messages. In addition, the companies will not be able to respond to law enforcement requests to turn the data over.

The Associated Press (AP) recently offered some ways that normal people can use for end-to-end encryption :

Texting

Officials said the hackers3 targeted the metadata of a large number of people. That included information on the dates, times and recipients5 of calls and texts. The hackers also got to see the information from texts from a much smaller number of people.

If you are an iPhone user, information in text messages that you send to someone else who also has an iPhone will be encrypted end-to-end. Look for the blue text bubbles which mean that the messages are encrypted iMessages.

The same goes for Android users sending texts through Google Messages. There will be a lock next to the timestamp on each message to show that the encryption is on.

But there is a weakness. When iPhone and Android users text each other, the messages are encrypted only using Rich Communication Services (RCS). That is a common method for messaging that has replaced the older SMS and MMS methods.

Apple notes that RCS messages "aren't end-to-end encrypted, which means they're not protected from a third party reading them while they're sent between devices."

Samsung, which sells Android smartphones, also indirectly6 described the issue in a small area at the bottom of a press release last month. Samsung said about RCS, "Encryption only available for Android-to-Android communication."

Chat apps

To avoid getting caught out when exchanging texts, experts recommend using encrypted messaging apps.

Privacy supporters are big fans of Signal, which uses end-to-end encryption on all messages and voice calls. Signal is an app that is run by an independent nonprofit group based in Mountainview, California. It promises never to sell customer data. The group has also made its source code publicly available so that it can be examined by anyone "for security and correctness."

Signal's encryption method is so respected that it has been included into competitor WhatsApp.

End-to-end encryption is also the normal mode for Facebook Messenger, which like WhatsApp is owned by Meta Platforms.

What about Telegram?

Telegram is an app that can be used for one-on-one discussions, group chats and broadcast "channels." But Telegram does not use end-to-end encryption normally. Users have to turn on end-to-end encryption. And Telegram's end-to-end encryption does not work with group chats.

Cybersecurity experts have warned people against using Telegram for private communications.

Making calls

Instead of using your phone to make calls through a wireless7 cellular8 network, you can make voice calls with Signal and WhatsApp. Both apps encrypt calls with the same technology that they use to encrypt messages.

There are other choices. If you have an iPhone, you can use Facetime for calls, while Android owners can use the Google Fi service. Both are end-to-end encrypted.

However, with all these choices, the person on the other end will also have to have the app.

WhatsApp and Signal users can choose the privacy setting they want in the settings. Such choices include hiding an IP address during calls to prevent your general location from being guessed.

I'm John Russell.

Kelvin Chan reported on this story for the Associated Press. John Russell adapted it for VOA Learning English.

______________________________________________

Words in This Story

encryption - n. changing something (such as data) into a code

hack1 - v. to gain illegal access to a computer network, computer system, phone, etc.

extent - n. a degree, point, or limit to which something goes to

key -n. information that permits a computer application to un-encrypt a message permitting the receiver to read it

metadata -- n. data that gives information about other data

recipient4 - n. someone who receives something

text (message) -n. a short message sent through a computer program from one person to another which can contain a written message, links or pictures

app (application) -n. a computer program that is designed to do one task or several linked tasks


分享到:


点击收听单词发音收听单词发音  

1 hack BQJz2     
n.劈,砍,出租马车;v.劈,砍,干咳
参考例句:
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
2 hacking KrIzgm     
n.非法访问计算机系统和数据库的活动
参考例句:
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
3 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
4 recipient QA8zF     
a.接受的,感受性强的 n.接受者,感受者,容器
参考例句:
  • Please check that you have a valid email certificate for each recipient. 请检查是否对每个接收者都有有效的电子邮件证书。
  • Colombia is the biggest U . S aid recipient in Latin America. 哥伦比亚是美国在拉丁美洲最大的援助对象。
5 recipients 972af69bf73f8ad23a446a346a6f0fff     
adj.接受的;受领的;容纳的;愿意接受的n.收件人;接受者;受领者;接受器
参考例句:
  • The recipients of the prizes had their names printed in the paper. 获奖者的姓名登在报上。 来自《简明英汉词典》
  • The recipients of prizes had their names printed in the paper. 获奖者名单登在报上。 来自《现代英汉综合大词典》
6 indirectly a8UxR     
adv.间接地,不直接了当地
参考例句:
  • I heard the news indirectly.这消息我是间接听来的。
  • They were approached indirectly through an intermediary.通过一位中间人,他们进行了间接接触。
7 wireless Rfwww     
adj.无线的;n.无线电
参考例句:
  • There are a lot of wireless links in a radio.收音机里有许多无线电线路。
  • Wireless messages tell us that the ship was sinking.无线电报告知我们那艘船正在下沉。
8 cellular aU1yo     
adj.移动的;细胞的,由细胞组成的
参考例句:
  • She has a cellular telephone in her car.她的汽车里有一部无线通讯电话机。
  • Many people use cellular materials as sensitive elements in hygrometers.很多人用蜂窝状的材料作为测量温度的传感元件。

本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。