{"id":95188,"date":"2022-01-20T07:17:34","date_gmt":"2022-01-20T15:17:34","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95188"},"modified":"2022-02-16T10:37:07","modified_gmt":"2022-02-16T18:37:07","slug":"10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/","title":{"rendered":"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"size-full wp-image-95190 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-660.png\" alt=\"\" width=\"660\" height=\"370\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-660.png 660w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-660-300x168.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-660-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-660-657x368.png 657w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>You may not understand how end-to-end encryption works, but you use it all the time. It protects your messages and emails, your purchases and bank transfers, and your access to websites and services. Governments around the world have tried to prohibit end-to-end encryption because they want to be able to listen in on what you say and spy on what you do.<\/p>\n<p><a href=\"https:\/\/www.rollingstone.com\/culture\/culture-news\/revealed-uk-government-publicity-blitz-to-undermine-privacy-encryption-1285453\/\">In the UK, the government is planning a PR blitz<\/a> to try to paint end-to-end encryption as dangerous, in reaction to Facebook adding end-to-end encryption to its Messenger app. The main thrust of their campaign is to paint end-to-end encryption as endangering children.<\/p>\n<p>If end-to-end encryption is made illegal, you would not be able to do very much on the internet, at least not securely. Here are 10 ways that end-to-end encryption protects you.<\/p>\n<h3 id=\"1.onlinebanking\">1. Online banking<\/h3>\n<p>Every time you log into your bank&#8217;s website, or use its app, all the data you send and receive is protected by end-to-end encryption. You can see your bank balance, but no one else can. You know how much you&#8217;ve spent on something, how much your salary is, and how much your mortgage costs, and you can transfer money to other accounts or people.<\/p>\n<p>End-to-end encryption is essential to protect data in transit; between your computer or smartphone and the server you connect to. This data doesn&#8217;t go directly from your device to the server; it goes over a number of routers and servers along a path that may not be anywhere near direct, depending on internet traffic.<\/p>\n<p>Here&#8217;s an example. I used <a href=\"https:\/\/tools.keycdn.com\/traceroute\">an online traceroute tool<\/a> to show the &#8220;hops&#8221; between a request to connect to apple.com from a dozen different cities. I&#8217;ve removed some of the data to only show IP addresses:<\/p>\n<p>1.|&#8211; 45.79.12.202<br \/>\n2.|&#8211; 45.79.12.2<br \/>\n3.|&#8211; 45.79.12.9<br \/>\n4.|&#8211; 213.248.83.174<br \/>\n5.|&#8211; 62.115.137.106<br \/>\n6.|&#8211; 62.115.151.71<br \/>\n7.|&#8211; 17.253.144.10<\/p>\n<p>You can see some similarities in the IP addresses above, so it looks like the data is going through multiple servers on the same network (hops 1, 2, and 3; hops 5 and 6), but there are six servers routing data between the sender and receiver.<\/p>\n<p>Any of those servers could be compromised by a &#8220;man in the middle&#8221; attack, and, if the data was not encrypted, it could be intercepted. Your banking information could go through a dozen or more servers, with varying levels of security protecting them from cybercriminals, and, in same cases, remain on those servers for some time, in caches. If the data is encrypted from end to end, then once it leaves your device, it&#8217;s only decrypted when it gets to your bank.<\/p>\n<p>Without end-to-end encryption, it would be like sending a postcard, which anyone could read before delivery.<\/p>\n<h3 id=\"2.onlineshopping\">2. Online shopping<\/h3>\n<p>Jeff Bezos wouldn&#8217;t be so wealthy if not for end-to-end encryption. The fact that you can use HTTPS (the secure hypertext transfer protocol) to transfer data to and from websites means that you can enter a credit card number, its expiry date, and its CVV, and not be worried about it being intercepted along the way. All e-commerce sites use HTTPS, and you should never enter a credit card number if you don&#8217;t see a padlock in your web browser&#8217;s address bar. (Our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/cyber-monday-5-essential-tips-to-stay-safe-shopping-online\/\">7 essential tips to stay safe shopping online<\/a> article explains this, and gives other security tips for online shopping.)<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"QVkfXZFjaX\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/cyber-monday-5-essential-tips-to-stay-safe-shopping-online\/\">7 essential tips to stay safe shopping online on Black Friday and Cyber Monday<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;7 essential tips to stay safe shopping online on Black Friday and Cyber Monday&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/cyber-monday-5-essential-tips-to-stay-safe-shopping-online\/embed\/#?secret=QVkfXZFjaX\" data-secret=\"QVkfXZFjaX\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3 id=\"3.textmessagesandphotosyousendviamessaging\">3. Text messages and photos you send via messaging<\/h3>\n<p>This is the target of the UK government: secure messaging. While there are many secure messaging services &#8211; Apple&#8217;s iMessage, Signal, WhatsApp, Telegram, and others &#8211; the UK is targeting Facebook Messenger, which does not yet use end-to-end encryption. With secure messaging, your chats, photos, and audio messages are protected, the same as your banking information: no one can read them except for you and the recipient. If you want to send spicy text messages or, ahem, &#8220;noods,&#8221; that&#8217;s your right; no government should be able to listen in on what you say to others.<\/p>\n<p>It&#8217;s important to point out that plain old SMS text messages (the &#8220;green bubble&#8221; conversations when you use Apple&#8217;s Messages app on your iPhone) are\u00a0<em>not<\/em> secure. Be sure to read our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/\">comparison of the top five secure text message apps<\/a>\u2014which can also be used for live video or audio phone calls.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"wnpFEZIYxT\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/\">5 Encrypted Messaging Apps for Mac, iPhone, and iPad<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;5 Encrypted Messaging Apps for Mac, iPhone, and iPad&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/embed\/#?secret=wnpFEZIYxT\" data-secret=\"wnpFEZIYxT\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3 id=\"4.videochats\">4. Video chats<\/h3>\n<p>As with text messages, video calls via FaceTime, Zoom, and Skype are protected by end-to-end encryption. Your video chats may be boring, but some people&#8217;s aren&#8217;t, and they wouldn&#8217;t want anyone to be able to see what they say and what they do.<\/p>\n<p>And businesses use videoconferencing a lot; they wouldn&#8217;t want competitors, or even nation states, to be able to see what they discuss. And what about government agencies? They regularly use video calling to interface with officials around the world.<\/p>\n<h3 id=\"5.yourphotos\">5. Your photos<\/h3>\n<p>My photo library has lots of cat photos, but also photos of family, friends, places I&#8217;ve been, and more. While not all these photos are personal, I wouldn&#8217;t want anyone sifting through my pics. You may have more risqu\u00e9 photos, and many celebrities have had their photo libraries hacked to expose their nude photos. Most people store their photos in the cloud &#8211; whether on Apple&#8217;s iCloud, Google Photos, or another service like SmugMug or Flickr &#8211; for convenience and easy access on mobile devices.<\/p>\n<p>If end-to-end encryption was not available, these photos would be easily accessible on the servers though which they transit from your phone to the repositories.<\/p>\n<h3 id=\"6.yourfilesinthecloud\">6. Your files in the cloud<\/h3>\n<p>As with photos, you may have lots of files in the cloud: you may use iCloud Drive, Dropbox, OneDrive, Box, or another service to store both personal and professional files. Many people store files in the cloud that contain sensitive information, such as financial information or health records.<\/p>\n<p>Without end-to-end encryption, every time you upload or download a file, it could potentially be intercepted and copied along the way.<\/p>\n<h3 id=\"7.youremail\">7. Your email<\/h3>\n<p>As with text messages, your email is sent and received using end-to-end encryption. It may not necessarily be encrypted on the email server, however; you&#8217;re trusting the company hosting your email to have impenetrable security. But at least during transit \u2014 when the message travels between you, email servers, and recipients \u2014 your emails are like sealed letters, not post cards. (They&#8217;re even more secure than sealed letters, because no one can steam them open.)<\/p>\n<p>Of course, it&#8217;s also best if your email messages are fully encrypted when &#8220;at rest&#8221; \u2014 that is, while stored on the mail provider&#8217;s servers \u2014 and that your mail provider follows other best practices to protect your security and privacy. For more information, check out our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/three-free-secure-email-hosts-that-protect-your-data\/\">review comparing secure email providers ProtonMail, Tutanota, and Mailfence<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"1ojhPevFVm\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/three-free-secure-email-hosts-that-protect-your-data\/\">Three Free Secure Email Providers That Protect Your Data and Privacy<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Three Free Secure Email Providers That Protect Your Data and Privacy&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/three-free-secure-email-hosts-that-protect-your-data\/embed\/#?secret=1ojhPevFVm\" data-secret=\"1ojhPevFVm\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3 id=\"8.youridentityandonlineaccounts\">8. Your identity and online accounts<\/h3>\n<p>Every online account you use, whether it&#8217;s Facebook, Twitter, Instagram, a forum, or a website where you post comments, benefits from end-to-end encryption using HTTPS. Your user name and password are protected, so no one can intercept them, log in as you, then post things as you, damaging your reputation.<\/p>\n<p>Before late 2010, many sites would only require HTTPS during sign-in, but would drop back to the insecure HTTP protocol afterward. Other sites did not even require HTTPS to sign in. This changed quickly thanks to the public release of a new hacking tool. <em>Firesheep<\/em> was a Firefox extension that made it easy for anyone to hijack the browsing session of anyone else on a public Wi-Fi network. This meant that anyone on the same Wi-Fi network could easily log into someone else&#8217;s accounts \u2014 without needing to know their passwords. (Intego&#8217;s Chief Security Analyst <a href=\"https:\/\/security.thejoshmeister.com\/search\/label\/firesheep\" target=\"_blank\" rel=\"noopener\">Josh Long wrote about Firesheep<\/a> on his blog in 2010 and 2011.)<\/p>\n<h3 id=\"9.workingfromhome\">9. Working from home<\/h3>\n<p>One reason that companies were able to have so many employees work from home during covid lockdowns is because of the availability of end-to-end encryption. This allows employees to access company websites, intranets, and servers, to have access to confidential files. Without it, much less work could have been accomplished during this period.<\/p>\n<h3 id=\"10.personaldataongovernmentandhealthcarewebsites\">10. Personal data on government and health care websites<\/h3>\n<p>You send and access a lot of personal data on government websites, and with health care providers and insurers. And this data is very confidential. If you have health issues, you don&#8217;t want anyone who doesn&#8217;t need to know about them to have access to your data. And you certainly don&#8217;t want anyone to access data on government websites, where you may file taxes, request benefits, and more. You may also use online accounting software, and the data here is confidential. End-to-end encryption ensures that it can&#8217;t be intercepted en route.<\/p>\n<p>These are just 10 ways that end-to-end encryption helps you stay secure everyday; there are many others, and any threat to end-to-end encryption is a threat to our general data security and identity.<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes!<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>End-to-end encryption protects your data, your privacy, and your bank accounts in many ways.<\/p>\n","protected":false},"author":46,"featured_media":95191,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[273,215,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"End-to-end encryption protects your data, your privacy, and your bank accounts in many ways.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"End-to-end encryption protects your data, your privacy, and your bank accounts in many ways.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-20T15:17:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-16T18:37:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/\",\"name\":\"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#primaryimage\"},\"datePublished\":\"2022-01-20T15:17:34+00:00\",\"dateModified\":\"2022-02-16T18:37:07+00:00\",\"description\":\"End-to-end encryption protects your data, your privacy, and your bank accounts in many ways.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance\",\"datePublished\":\"2022-01-20T15:17:34+00:00\",\"dateModified\":\"2022-02-16T18:37:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#webpage\"},\"wordCount\":1562,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png\",\"keywords\":[\"Encryption\",\"Identity Theft\",\"Security\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"End-to-end encryption protects your data, your privacy, and your bank accounts in many ways.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/","og_locale":"en_US","og_type":"article","og_title":"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance - The Mac Security Blog","og_description":"End-to-end encryption protects your data, your privacy, and your bank accounts in many ways.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-01-20T15:17:34+00:00","article_modified_time":"2022-02-16T18:37:07+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/","name":"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#primaryimage"},"datePublished":"2022-01-20T15:17:34+00:00","dateModified":"2022-02-16T18:37:07+00:00","description":"End-to-end encryption protects your data, your privacy, and your bank accounts in many ways.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance","datePublished":"2022-01-20T15:17:34+00:00","dateModified":"2022-02-16T18:37:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#webpage"},"wordCount":1562,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png","keywords":["Encryption","Identity Theft","Security"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/end-to-end-400.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oLi","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95188"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95188"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95188\/revisions"}],"predecessor-version":[{"id":95371,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95188\/revisions\/95371"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/95191"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}