Return to Video

Think your email's private? Think again

  • 0:01 - 0:06
    Twenty-five years ago, scientists at CERN
    created the World Wide Web.
  • 0:06 - 0:10
    Since then, the Internet has transformed
    the way we communicate,
  • 0:10 - 0:14
    the way we do business,
    and even the way we live.
  • 0:14 - 0:16
    In many ways,
  • 0:16 - 0:21
    the ideas that gave birth to Google,
    Facebook, Twitter, and so many others,
  • 0:21 - 0:23
    have now really transformed our lives,
  • 0:23 - 0:27
    and this has brought us many real benefits
    such as a more connected society.
  • 0:27 - 0:30
    However, there are also
    some downsides to this.
  • 0:31 - 0:34
    Today, the average person
    has an astounding amount
  • 0:34 - 0:36
    of personal information online,
  • 0:36 - 0:40
    and we add to this online information
    every single time we post on Facebook,
  • 0:40 - 0:42
    each time we search on Google,
  • 0:42 - 0:44
    and each time we send an email.
  • 0:44 - 0:46
    Now, many of us probably think,
  • 0:46 - 0:49
    well, one email,
    there's nothing in there, right?
  • 0:49 - 0:53
    But if you consider
    a year's worth of emails,
  • 0:53 - 0:56
    or maybe even a lifetime of email,
  • 0:56 - 0:58
    collectively, this tells a lot.
  • 0:58 - 1:01
    It tells where we have been,
    who we have met,
  • 1:01 - 1:05
    and in many ways,
    even what we're thinking about.
  • 1:05 - 1:09
    And the more scary part about this is
    our data now lasts forever,
  • 1:09 - 1:12
    so your data can and will outlive you.
  • 1:12 - 1:16
    What has happened is that we've largely
    lost control over our data
  • 1:16 - 1:18
    and also our privacy.
  • 1:18 - 1:21
    So this year, as the web turns 25,
  • 1:21 - 1:24
    it's very important for us
    to take a moment
  • 1:24 - 1:26
    and think about the implications of this.
  • 1:26 - 1:28
    We have to really think.
  • 1:28 - 1:30
    We've lost privacy, yes,
  • 1:30 - 1:33
    but actually what we've also lost
    is the idea of privacy itself.
  • 1:34 - 1:36
    If you think about it,
  • 1:36 - 1:40
    most of us here today probably remember
    what life was like before the Internet,
  • 1:40 - 1:42
    but today, there's a new generation
  • 1:42 - 1:46
    that is being taught from a very young age
    to share everything online,
  • 1:46 - 1:50
    and this is a generation that is not
    going to remember when data was private.
  • 1:50 - 1:54
    So we keep going down this road,
    20 years from now,
  • 1:54 - 1:57
    the word 'privacy' is going to have
    a completely different meaning
  • 1:57 - 1:59
    from what it means to you and I.
  • 1:59 - 2:01
    So, it's time for us
    to take a moment and think,
  • 2:01 - 2:04
    is there anything we can do about this?
  • 2:04 - 2:07
    And I believe there is.
  • 2:07 - 2:10
    Let's take a look at one of the most
    widely used forms of communication
  • 2:10 - 2:13
    in the world today: email.
  • 2:13 - 2:16
    Before the invention of email,
    we largely communicated using letters,
  • 2:16 - 2:19
    and the process was quite simple.
  • 2:19 - 2:22
    You would first start by writing
    your message on a piece of paper,
  • 2:22 - 2:24
    then you would place it
    into a sealed envelope,
  • 2:24 - 2:26
    and from there,
    you would go ahead and send it
  • 2:26 - 2:28
    after you put a stamp and address on it.
  • 2:28 - 2:30
    Unfortunately, today,
  • 2:30 - 2:33
    when we actually send an email,
    we're not sending a letter.
  • 2:33 - 2:35
    What you are sending, in many ways,
    is actually a postcard,
  • 2:35 - 2:39
    and it's a postcard in the sense
    that everybody that sees it
  • 2:39 - 2:43
    from the time it leaves your computer
    to when it gets to the recipient
  • 2:43 - 2:45
    can actually read the entire contents.
  • 2:45 - 2:49
    So, the solution to this
    has been known for some time,
  • 2:49 - 2:51
    and there's many attempts to do it.
  • 2:51 - 2:54
    The most basic solution
    is to use encryption,
  • 2:54 - 2:56
    and the idea is quite simple.
  • 2:56 - 2:57
    First, you encrypt the connection
  • 2:57 - 3:00
    between your computer
    and the email server.
  • 3:00 - 3:04
    Then, you also encrypt the data
    as it sits on the server itself.
  • 3:04 - 3:06
    But there's a problem with this,
  • 3:06 - 3:09
    and that is, the email servers
    also hold the encryption keys,
  • 3:09 - 3:13
    so now you have a really big lock
    with a key placed right next to it.
  • 3:13 - 3:16
    But not only that, any government
    could lawfully ask for
  • 3:16 - 3:18
    and get the key to your data,
  • 3:18 - 3:21
    and this is all without you
    being aware of it.
  • 3:21 - 3:26
    So the way we fix this problem
    is actually relatively easy, in principle:
  • 3:26 - 3:29
    You give everybody their own keys,
  • 3:29 - 3:32
    and then you make sure the server
    doesn't actually have the keys.
  • 3:32 - 3:34
    This seems like common sense, right?
  • 3:34 - 3:38
    So the question that comes up is,
    why hasn't this been done yet?
  • 3:38 - 3:41
    Well, if we really think about it,
  • 3:41 - 3:44
    we see that the business model
    of the Internet today
  • 3:44 - 3:46
    really isn't compatible with privacy.
  • 3:46 - 3:49
    Just take a look at some
    of the biggest names on the web,
  • 3:49 - 3:52
    and you see that advertising
    plays a huge role.
  • 3:52 - 3:56
    In fact, this year alone,
    advertising is 137 billion dollars,
  • 3:56 - 3:58
    and to optimize the ads
    that are shown to us,
  • 3:58 - 4:01
    companies have to know
    everything about us.
  • 4:01 - 4:03
    They need to know where we live,
  • 4:03 - 4:06
    how old we are, what we like,
    what we don't like,
  • 4:06 - 4:08
    and anything else
    they can get their hands on.
  • 4:08 - 4:10
    And if you think about it,
  • 4:10 - 4:14
    the best way to get this information
    is really just to invade our privacy.
  • 4:14 - 4:17
    So these companies
    aren't going to give us our privacy.
  • 4:17 - 4:19
    If we want to have privacy online,
  • 4:19 - 4:23
    what we have to do is
    we've got to go out and get it ourselves.
  • 4:23 - 4:25
    For many years, when it came to email,
  • 4:25 - 4:28
    the only solution
    was something known as PGP,
  • 4:28 - 4:31
    which was quite complicated
    and only accessible to the tech-savvy.
  • 4:31 - 4:34
    Here's a diagram that basically shows
  • 4:34 - 4:36
    the process for encrypting
    and decrypting messages.
  • 4:36 - 4:39
    So needless to say,
    this is not a solution for everybody,
  • 4:39 - 4:42
    and this actually is part of the problem,
  • 4:42 - 4:45
    because if you think about communication,
  • 4:45 - 4:49
    by definition, it involves
    having someone to communicate with.
  • 4:49 - 4:52
    So while PGP does a great job
    of what it's designed to do,
  • 4:52 - 4:55
    for the people out there
    who can't understand how to use it,
  • 4:55 - 4:58
    the option to communicate privately
    simply does not exist.
  • 4:58 - 5:01
    And this is a problem
    that we need to solve.
  • 5:01 - 5:03
    So if we want to have privacy online,
  • 5:03 - 5:06
    the only way we can succeed
    is if we get the whole world on board,
  • 5:06 - 5:10
    and this is only possible
    if we bring down the barrier to entry.
  • 5:10 - 5:13
    I think this is actually the key challenge
    that lies in the tech community.
  • 5:13 - 5:17
    What we really have to do
    is work and make privacy more accessible.
  • 5:17 - 5:20
    So last summer, when
    the Edward Snowden story came out,
  • 5:20 - 5:24
    several colleagues and I decided to see
    if we could make this happen.
  • 5:24 - 5:29
    At that time, we were working at the
    European Organization for Nuclear Research
  • 5:29 - 5:33
    at the world's largest particle collider,
    which collides protons, by the way.
  • 5:33 - 5:36
    We were all scientists,
    so we used our scientific creativity
  • 5:36 - 5:39
    and came up with a very
    creative name for our project:
  • 5:39 - 5:41
    ProtonMail.
    (Laughter)
  • 5:41 - 5:44
    Many startups these days
    actually begin in people's garages
  • 5:44 - 5:46
    or people's basements.
  • 5:46 - 5:47
    We were a bit different.
  • 5:47 - 5:50
    We started out at the CERN cafeteria,
  • 5:50 - 5:53
    which actually is great, because look,
  • 5:53 - 5:55
    you have all the food
    and water you could ever want.
  • 5:55 - 5:57
    But even better than this
    is that every day
  • 5:57 - 6:01
    between 12 p.m. and 2 p.m.,
    free of charge,
  • 6:01 - 6:06
    the CERN cafeteria comes with
    several thousand scientists and engineers,
  • 6:06 - 6:08
    and these guys basically know
    the answers to everything.
  • 6:08 - 6:11
    So it was in this environment
    that we began working.
  • 6:11 - 6:14
    What we actually want to do
    is we want to take your email
  • 6:14 - 6:18
    and turn it into something
    that looks more like this,
  • 6:18 - 6:20
    but more importantly,
    we want to do it in a way
  • 6:20 - 6:22
    that you can't even tell
    that it's happened.
  • 6:22 - 6:25
    So to do this, we actually need
    a combination of technology
  • 6:25 - 6:27
    and also design.
  • 6:27 - 6:29
    So how do we go about
    doing something like this?
  • 6:30 - 6:34
    Well, it's probably a good idea
    not to put the keys on the server.
  • 6:34 - 6:38
    So what we do is we generate
    encryption keys on your computer,
  • 6:38 - 6:42
    and we don't generate a single key,
    but actually a pair of keys,
  • 6:42 - 6:46
    so there's an RSA private key
    and an RSA public key,
  • 6:46 - 6:48
    and these keys
    are mathematically connected.
  • 6:48 - 6:50
    So let's have a look
    and see how this works
  • 6:50 - 6:53
    when multiple people communicate.
  • 6:53 - 6:57
    So here we have Bob and Alice,
    who want to communicate privately.
  • 6:57 - 7:01
    So the key challenge
    is to take Bob's message
  • 7:01 - 7:05
    and to get it to Alice in such a way
    that the server cannot read that message.
  • 7:05 - 7:08
    So what we have to do
    is we have to encrypt it
  • 7:08 - 7:10
    before it even leaves Bob's computer,
  • 7:10 - 7:14
    and one of the tricks is, we encrypt it
    using the public key from Alice.
  • 7:14 - 7:19
    Now this encrypted data is sent
    through the server to Alice,
  • 7:19 - 7:24
    and because the message was encrypted
    using Alice's public key,
  • 7:24 - 7:28
    the only key that can now decrypt it
    is a private key that belongs to Alice,
  • 7:28 - 7:33
    and it turns out Alice is the only person
    that actually has this key.
  • 7:33 - 7:35
    So we've now accomplished the objective,
  • 7:35 - 7:37
    which is to get the message
    from Bob to Alice
  • 7:37 - 7:40
    without the server being able
    to read what's going on.
  • 7:40 - 7:43
    Actually, what I've shown here
    is a highly simplified picture.
  • 7:43 - 7:45
    The reality is much more complex
  • 7:45 - 7:49
    and it requires a lot of software
    that looks a bit like this.
  • 7:49 - 7:51
    And that's actually
    the key design challenge:
  • 7:51 - 7:55
    How do we take all this complexity,
    all this software,
  • 7:55 - 7:59
    and implement it in a way
    that the user cannot see it.
  • 7:59 - 8:02
    I think with ProtonMail,
    we have gotten pretty close to doing this.
  • 8:02 - 8:05
    So let's see how it works in practice.
  • 8:05 - 8:08
    Here, we've got Bob and Alice again,
  • 8:08 - 8:10
    who also want to communicate securely.
  • 8:10 - 8:12
    They simply create accounts on ProtonMail,
  • 8:12 - 8:15
    which is quite simple
    and takes a few moments,
  • 8:15 - 8:17
    and all the key encryption and generation
  • 8:17 - 8:19
    is happening automatically
    in the background
  • 8:19 - 8:21
    as Bob is creating his account.
  • 8:21 - 8:24
    Once his account is created,
    he just clicks "compose,"
  • 8:24 - 8:27
    and now he can write his email
    like he does today.
  • 8:27 - 8:28
    So he fills in his information,
  • 8:28 - 8:32
    and then after that,
    all he has to do is click "send,"
  • 8:32 - 8:35
    and just like that,
    without understanding cryptography,
  • 8:35 - 8:39
    and without doing anything different
    from how he writes email today,
  • 8:39 - 8:41
    Bob has just sent an encrypted message.
  • 8:41 - 8:46
    What we have here
    is really just the first step,
  • 8:46 - 8:48
    but it shows that
    with improving technology,
  • 8:48 - 8:52
    privacy doesn't have to be difficult,
    it doesn't have to be disruptive.
  • 8:52 - 8:57
    If we change the goal from maximizing
    ad revenue to protecting data,
  • 8:57 - 8:59
    we can actually make it accessible.
  • 8:59 - 9:01
    Now, I know a question
    on everybody's minds is,
  • 9:01 - 9:04
    okay, protecting privacy,
    this is a great goal,
  • 9:04 - 9:06
    but can you actually do this
  • 9:06 - 9:09
    without the tons of money
    that advertisements give you?
  • 9:09 - 9:11
    And I think the answer is actually yes,
  • 9:11 - 9:14
    because today, we've reached a point
  • 9:14 - 9:18
    where people around the world really
    understand how important privacy is,
  • 9:18 - 9:21
    and when you have that,
    anything is possible.
  • 9:21 - 9:22
    Earlier this year,
  • 9:22 - 9:25
    ProtonMail actually had so many users
    that we ran out of resources,
  • 9:25 - 9:28
    and when this happened,
    our community of users got together
  • 9:28 - 9:30
    and donated half a million dollars.
  • 9:30 - 9:33
    So this is just an example
    of what can happen
  • 9:33 - 9:36
    when you bring the community together
    towards a common goal.
  • 9:36 - 9:37
    We can also leverage the world.
  • 9:37 - 9:39
    Right now,
  • 9:39 - 9:42
    we have a quarter of a million people
    that have signed up for ProtonMail,
  • 9:42 - 9:44
    and these people come from everywhere,
  • 9:44 - 9:45
    and this really shows that privacy
  • 9:45 - 9:48
    is not just an American
    or a European issue,
  • 9:48 - 9:50
    it's a global issue
    that impacts all of us.
  • 9:50 - 9:54
    It's something that we really
    have to pay attention to going forward.
  • 9:54 - 9:57
    So what do we have to do
    to solve this problem?
  • 9:57 - 9:59
    Well, first of all,
  • 9:59 - 10:02
    we need to support a different
    business model for the Internet,
  • 10:02 - 10:04
    one that does not rely
    entirely on advertisements
  • 10:04 - 10:06
    for revenue and for growth.
  • 10:06 - 10:09
    We actually need to build a new Internet
  • 10:09 - 10:14
    where our privacy and our ability
    to control our data is first and foremost.
  • 10:14 - 10:16
    But even more importantly,
  • 10:16 - 10:21
    we have to build an Internet
    where privacy is no longer just an option
  • 10:21 - 10:23
    but is also the default.
  • 10:24 - 10:26
    We have done the first step
    with ProtonMail,
  • 10:26 - 10:30
    but this is really just the first step
    in a very, very long journey.
  • 10:30 - 10:33
    The good news I can share
    with you guys today,
  • 10:33 - 10:36
    the exciting news,
    is that we're not traveling alone.
  • 10:36 - 10:38
    The movement to protect people's privacy
    and freedom online
  • 10:38 - 10:40
    is really gaining momentum,
  • 10:40 - 10:43
    and today, there are dozens of projects
    from all around the world
  • 10:43 - 10:47
    who are working together
    to improve our privacy.
  • 10:47 - 10:51
    These projects protect things
    from our chat to voice communications,
  • 10:51 - 10:53
    also our file storage, our online search,
  • 10:53 - 10:56
    our online browsing,
    and many other things.
  • 10:56 - 11:00
    And these projects are not backed
    by billions of dollars in advertising,
  • 11:00 - 11:02
    but they've found support
    really from the people,
  • 11:02 - 11:05
    from private individuals like you and I
    from all over the world.
  • 11:05 - 11:08
    This really matters, because ultimately,
  • 11:08 - 11:12
    privacy depends on each
    and every one of us,
  • 11:12 - 11:15
    and we have to protect it now
    because our online data
  • 11:15 - 11:18
    is more than just a collection
    of ones and zeros.
  • 11:18 - 11:19
    It's actually a lot more than that.
  • 11:19 - 11:22
    It's our lives, our personal stories,
  • 11:22 - 11:24
    our friends, our families,
  • 11:24 - 11:28
    and in many ways,
    also our hopes and our aspirations.
  • 11:28 - 11:31
    We need to spend time now
    to really protect our right
  • 11:31 - 11:34
    to share this only with people
    that we want to share this with,
  • 11:34 - 11:36
    because without this,
    we simply can't have a free society.
  • 11:36 - 11:39
    So now's the time for us
    to collectively stand up and say,
  • 11:39 - 11:43
    yes, we do want to live
    in a world with online privacy,
  • 11:43 - 11:47
    and yes, we can work together
    to turn this vision into a reality.
  • 11:47 - 11:49
    Thank you.
  • 11:49 - 11:56
    (Applause)
Title:
Think your email's private? Think again
Speaker:
Andy Yen
Description:

Sending an email message is like sending a postcard, says scientist Andy Yen in this thought-provoking talk: Anyone can read it. Yet encryption, the technology that protects the privacy of email communication, does exist. It's just that until now it has been difficult to install and a hassle to use. Showing a demo of an email program he designed with colleagues at CERN, Yen argues that encryption can be made simple to the point of becoming the default option, providing true email privacy to all.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
12:09

English subtitles

Revisions Compare revisions