搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
U.S. cybersecurity officials are advising people to use encryption in their communications after a major hacking2 campaign.
Federal officials released a list of security suggestions for U.S. telecommunications companies that were targeted.
The advice includes one suggestion that everyone can use: "Ensure that traffic is end-to-end encrypted to the maximum extent possible."
End-to-end encryption, also known as E2EE, means that messages are protected so that only the sender and receiver can see them. If anyone else gets the message, all they will see is disordered information that cannot be understood without the key.
Law enforcement officials had until now resisted encryption. This resistance is because the encryption means the technology companies themselves will not be able to look at the messages. In addition, the companies will not be able to respond to law enforcement requests to turn the data over.
The Associated Press (AP) recently offered some ways that normal people can use for end-to-end encryption :
Texting
Officials said the hackers3 targeted the metadata of a large number of people. That included information on the dates, times and recipients5 of calls and texts. The hackers also got to see the information from texts from a much smaller number of people.
If you are an iPhone user, information in text messages that you send to someone else who also has an iPhone will be encrypted end-to-end. Look for the blue text bubbles which mean that the messages are encrypted iMessages.
The same goes for Android users sending texts through Google Messages. There will be a lock next to the timestamp on each message to show that the encryption is on.
But there is a weakness. When iPhone and Android users text each other, the messages are encrypted only using Rich Communication Services (RCS). That is a common method for messaging that has replaced the older SMS and MMS methods.
Apple notes that RCS messages "aren't end-to-end encrypted, which means they're not protected from a third party reading them while they're sent between devices."
Samsung, which sells Android smartphones, also indirectly6 described the issue in a small area at the bottom of a press release last month. Samsung said about RCS, "Encryption only available for Android-to-Android communication."
Chat apps
To avoid getting caught out when exchanging texts, experts recommend using encrypted messaging apps.
Privacy supporters are big fans of Signal, which uses end-to-end encryption on all messages and voice calls. Signal is an app that is run by an independent nonprofit group based in Mountainview, California. It promises never to sell customer data. The group has also made its source code publicly available so that it can be examined by anyone "for security and correctness."
Signal's encryption method is so respected that it has been included into competitor WhatsApp.
End-to-end encryption is also the normal mode for Facebook Messenger, which like WhatsApp is owned by Meta Platforms.
What about Telegram?
Telegram is an app that can be used for one-on-one discussions, group chats and broadcast "channels." But Telegram does not use end-to-end encryption normally. Users have to turn on end-to-end encryption. And Telegram's end-to-end encryption does not work with group chats.
Cybersecurity experts have warned people against using Telegram for private communications.
Making calls
Instead of using your phone to make calls through a wireless7 cellular8 network, you can make voice calls with Signal and WhatsApp. Both apps encrypt calls with the same technology that they use to encrypt messages.
There are other choices. If you have an iPhone, you can use Facetime for calls, while Android owners can use the Google Fi service. Both are end-to-end encrypted.
However, with all these choices, the person on the other end will also have to have the app.
WhatsApp and Signal users can choose the privacy setting they want in the settings. Such choices include hiding an IP address during calls to prevent your general location from being guessed.
I'm John Russell.
Kelvin Chan reported on this story for the Associated Press. John Russell adapted it for VOA Learning English.
______________________________________________
Words in This Story
encryption - n. changing something (such as data) into a code
hack1 - v. to gain illegal access to a computer network, computer system, phone, etc.
extent - n. a degree, point, or limit to which something goes to
key -n. information that permits a computer application to un-encrypt a message permitting the receiver to read it
metadata -- n. data that gives information about other data
recipient4 - n. someone who receives something
text (message) -n. a short message sent through a computer program from one person to another which can contain a written message, links or pictures
app (application) -n. a computer program that is designed to do one task or several linked tasks
1 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
2 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
3 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
4 recipient | |
a.接受的,感受性强的 n.接受者,感受者,容器 | |
参考例句: |
|
|
5 recipients | |
adj.接受的;受领的;容纳的;愿意接受的n.收件人;接受者;受领者;接受器 | |
参考例句: |
|
|
6 indirectly | |
adv.间接地,不直接了当地 | |
参考例句: |
|
|
7 wireless | |
adj.无线的;n.无线电 | |
参考例句: |
|
|
8 cellular | |
adj.移动的;细胞的,由细胞组成的 | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。