Return to Video

Think your email's private? Think again

  • 0:01 - 0:04
    Twenty-five years ago, scientists at CERN
  • 0:04 - 0:06
    created the World Wide Web.
  • 0:06 - 0:10
    Since then, the Internet has transformed
    the way we communicate,
  • 0:10 - 0:14
    the way we do business,
    and even the way we live.
  • 0:14 - 0:16
    In many ways,
  • 0:16 - 0:21
    the ideas that gave birth to Google,
    Facebook, Twitter, and so many others,
  • 0:21 - 0:23
    have now really transformed our lives,
  • 0:23 - 0:27
    and this has brought us many real benefits
    such as a more connected society.
  • 0:27 - 0:30
    However, there are also
    some downsides to this.
  • 0:31 - 0:34
    Today, the average person
    has an astounding amount
  • 0:34 - 0:36
    of personal information online,
  • 0:36 - 0:40
    and we add to this online information
    every single time we post on Facebook,
  • 0:40 - 0:42
    each time we search on Google,
  • 0:42 - 0:44
    and each time we send an email.
  • 0:44 - 0:46
    Now, many of us probably think,
  • 0:46 - 0:49
    "Well, one email,
    there's nothing in there, right?"
  • 0:49 - 0:53
    But if you consider
    a year's worth of emails,
  • 0:53 - 0:56
    or maybe even a lifetime of email,
  • 0:56 - 0:58
    collectively, this tells a lot.
  • 0:58 - 1:01
    It tells where we have been,
    who we have met,
  • 1:01 - 1:05
    and in many ways,
    even what we're thinking about.
  • 1:05 - 1:07
    And the more scary part about this is,
  • 1:07 - 1:09
    our data now lasts forever,
  • 1:09 - 1:12
    so your data can and will outlive you.
  • 1:12 - 1:16
    What has happened is that we've largely
    lost control over our data
  • 1:16 - 1:18
    and also our privacy.
  • 1:18 - 1:21
    So this year, as the Web turns 25,
  • 1:21 - 1:24
    it's very important for us
    to take a moment
  • 1:24 - 1:26
    and think about the implications of this.
  • 1:26 - 1:28
    We have to really think:
  • 1:28 - 1:30
    we've lost privacy, yes,
  • 1:30 - 1:33
    but actually what we've also lost
    is the idea of privacy itself.
  • 1:34 - 1:36
    If you think about it,
  • 1:36 - 1:40
    most of us here today probably remember
    what life was like before the Internet,
  • 1:40 - 1:42
    but today, there's a new generation
  • 1:42 - 1:46
    that is being taught from a very young age
    to share everything online,
  • 1:46 - 1:50
    and this is a generation that is not
    going to remember when data was private.
  • 1:50 - 1:52
    So we keep going down this road.
  • 1:52 - 1:54
    Twenty years from now,
  • 1:54 - 1:57
    the word 'privacy' is going to have
    a completely different meaning
  • 1:57 - 1:59
    from what it means to you and I.
  • 1:59 - 2:01
    So, it's time for us to take a moment
  • 2:01 - 2:04
    and think, is there anything
    we can do about this?
  • 2:04 - 2:07
    And I believe there is.
  • 2:07 - 2:10
    Let's take a look at one of the most
    widely used forms of communication
  • 2:10 - 2:13
    in the world today: email.
  • 2:13 - 2:16
    Before the invention of email,
    we largely communicated using letters,
  • 2:16 - 2:19
    and the process was quite simple.
  • 2:19 - 2:22
    You would first start by writing
    your message on a piece of paper,
  • 2:22 - 2:24
    then you would place it
    in a sealed envelope,
  • 2:24 - 2:26
    and from there,
    you would go ahead and send it
  • 2:26 - 2:28
    after you put a stamp and address on it.
  • 2:28 - 2:30
    Unfortunately, today,
  • 2:30 - 2:33
    when we actually send an email,
    we're not sending a letter.
  • 2:33 - 2:35
    What you are sending, in many ways,
    is actually a postcard,
  • 2:35 - 2:39
    and it's a postcard in the sense
    that everybody that sees it
  • 2:39 - 2:43
    from the time it leaves your computer
    to when it gets to the recipient
  • 2:43 - 2:45
    can actually read the entire contents.
  • 2:45 - 2:49
    So, the solution to this
    has been known for some time,
  • 2:49 - 2:51
    and there's many attempts to do it.
  • 2:51 - 2:54
    The most basic solution
    is to use encryption,
  • 2:54 - 2:56
    and the idea is quite simple.
  • 2:56 - 2:57
    First, you encrypt the connection
  • 2:57 - 3:00
    between your computer
    and the email server.
  • 3:00 - 3:04
    Then, you also encrypt the data
    as it sits on the server itself.
  • 3:04 - 3:06
    But there's a problem with this,
  • 3:06 - 3:09
    and that is, the email servers
    also hold the encryption keys,
  • 3:09 - 3:13
    so now you have a really big lock
    with a key placed right next to it.
  • 3:13 - 3:16
    But not only that, any government
    could lawfully ask for
  • 3:16 - 3:18
    and get the key to your data,
  • 3:18 - 3:21
    and this is all without you
    being aware of it.
  • 3:21 - 3:26
    So the way we fix this problem
    is actually relatively easy, in principle:
  • 3:26 - 3:29
    you give everybody their own keys,
  • 3:29 - 3:32
    and then you make sure the server
    doesn't actually have the keys.
  • 3:32 - 3:34
    This seems like common sense, right?
  • 3:34 - 3:38
    So the question that comes up is,
    why hasn't this been done yet?
  • 3:38 - 3:41
    Well, if we really think about it,
  • 3:41 - 3:44
    we see that the business model
    of the Internet today
  • 3:44 - 3:46
    really isn't compatible with privacy.
  • 3:46 - 3:49
    Just take a look at some
    of the biggest names on the Web,
  • 3:49 - 3:52
    and you see that advertising
    plays a huge role.
  • 3:52 - 3:56
    In fact, this year alone,
    advertising is $137 billion,
  • 3:56 - 3:58
    and to optimize the ads
    that are shown to us,
  • 3:58 - 4:01
    companies have to know
    everything about us.
  • 4:01 - 4:03
    They need to know where we live,
  • 4:03 - 4:06
    how old we are, what we like,
    what we don't like,
  • 4:06 - 4:08
    and anything else
    they can get their hands on.
  • 4:08 - 4:10
    And if you think about it,
  • 4:10 - 4:12
    the best way to get this information
  • 4:12 - 4:14
    is really just invade our privacy.
  • 4:14 - 4:17
    So these companies
    aren't going to give us our privacy.
  • 4:17 - 4:20
    If we want to have privacy online,
    what we have to do is
  • 4:20 - 4:23
    we've got to go out and get it ourselves.
  • 4:23 - 4:25
    For many years, when it came to email,
  • 4:25 - 4:28
    the only solution
    was something known as PGP,
  • 4:28 - 4:31
    which was quite complicated
    and only accessible to the tech-savvy.
  • 4:31 - 4:34
    Here's a diagram that basically shows
  • 4:34 - 4:36
    the process for encrypting
    and decrypting messages.
  • 4:36 - 4:39
    So needless to say,
    this is not a solution for everybody,
  • 4:39 - 4:42
    and this actually is part of the problem,
  • 4:42 - 4:45
    because if you think about communication,
  • 4:45 - 4:49
    by definition, it involves
    having someone to communicate with.
  • 4:49 - 4:52
    So while PGP does a great job
    of what it's designed to do,
  • 4:52 - 4:55
    for the people out there
    who can't understand how to use it,
  • 4:55 - 4:58
    the option to communicate privately
    simply does not exist.
  • 4:58 - 5:01
    And this is a problem
    that we need to solve.
  • 5:01 - 5:03
    So if we want to have privacy online,
  • 5:03 - 5:06
    the only way we can succeed
    is we get the whole world on board,
  • 5:06 - 5:10
    and this is only possible
    if we bring down the barrier to entry.
  • 5:10 - 5:13
    I think this is actually the key challenge
    that lies in the tech community.
  • 5:13 - 5:17
    What we really have to do
    is work and make privacy more accessible.
  • 5:17 - 5:20
    So last summer, when
    the Edward Snowden story came out,
  • 5:20 - 5:24
    several colleagues and I decided to see
    if we could make this happen.
  • 5:25 - 5:26
    At that time, we were working
  • 5:26 - 5:29
    at the European Organization
    for Nuclear Research,
  • 5:29 - 5:33
    at the world's largest particle collider,
    which collides protons, by the way.
  • 5:33 - 5:36
    We were all scientists,
    so we used our scientific creativity
  • 5:36 - 5:39
    and came up with a very
    creative name for our project:
  • 5:39 - 5:42
    ProtonMail.
  • 5:42 - 5:44
    Many start-ups these days
    actually begin in people's garages
  • 5:44 - 5:46
    or people's basements.
  • 5:46 - 5:49
    We were a bit different.
  • 5:49 - 5:51
    We started out at the CERN cafeteria,
  • 5:51 - 5:53
    which actually is great, because look,
  • 5:53 - 5:55
    you have all the food
    and water you could ever want.
  • 5:55 - 5:57
    But even better than this
    is that every day
  • 5:57 - 6:01
    between 12 p.m. and 2 p.m. free of charge
  • 6:01 - 6:06
    the CERN cafeteria comes with
    several thousand scientists and engineers,
  • 6:06 - 6:08
    and these guys basically know
    the answers to everything.
  • 6:08 - 6:11
    So it was in this environment
    that we began working.
  • 6:11 - 6:14
    What we actually want to do
    is we want to take your email
  • 6:14 - 6:18
    and turn it into something
    that looks more like this,
  • 6:18 - 6:20
    but more importantly,
    we want to do it in a way
  • 6:20 - 6:22
    that you can't even tell
    that it's happened.
  • 6:22 - 6:25
    So to do this, we actually need
    a combination of technology
  • 6:25 - 6:27
    and also design.
  • 6:27 - 6:29
    So how do we go about
    doing something like this?
  • 6:30 - 6:34
    Well, it's probably a good idea
    not to put the keys on the server.
  • 6:34 - 6:38
    So what we do is we generate
    encryption keys on your computer,
  • 6:38 - 6:42
    and we don't generate a single key,
    but actually a pair of keys,
  • 6:42 - 6:46
    so there's an RSA private key
    and an RSA public key,
  • 6:46 - 6:48
    and these keys
    are mathematically connected.
  • 6:48 - 6:50
    So let's have a look
    and see how this works
  • 6:50 - 6:53
    when multiple people communicate.
  • 6:53 - 6:57
    So here we have Bob and Alice,
    who want to communicate privately.
  • 6:57 - 7:01
    So the key challenge
    is to take Bob's message
  • 7:01 - 7:05
    and to get it to Alice in such a way
    that the server cannot read that message.
  • 7:05 - 7:08
    So what we have to do
    is we have to encrypt it
  • 7:08 - 7:10
    before it even leaves Bob's computer,
  • 7:10 - 7:14
    and one of the tricks is, we encrypt it
    using the public key from Alice.
  • 7:14 - 7:19
    Now this encrypted data is sent
    through the server to Alice,
  • 7:19 - 7:24
    and because the message was encrypted
    using Alice's public key,
  • 7:24 - 7:28
    the only key that can now decrypt it
    is a private key that belongs to Alice,
  • 7:28 - 7:33
    and it turns out Alice is the only person
    that actually has this key.
  • 7:33 - 7:35
    So we've now accomplished the objective,
  • 7:35 - 7:37
    which is to get the message
    from Bob to Alice
  • 7:37 - 7:40
    without the server being able
    to read what's going on.
  • 7:40 - 7:43
    Actually, what I've shown here
    is a highly simplified picture.
  • 7:43 - 7:45
    The reality is much more complex
  • 7:45 - 7:49
    and it requires a lot of software
    that looks a bit like this,
  • 7:49 - 7:51
    and that's actually
    the key design challenge,
  • 7:51 - 7:54
    how do we take all this complexity,
  • 7:54 - 7:56
    all this software,
    and implement it in a way
  • 7:56 - 7:59
    that the user cannot see it.
  • 7:59 - 8:02
    I think with ProtonMail,
    we have gotten pretty close to doing this.
  • 8:02 - 8:05
    So let's see how it works in practice.
  • 8:05 - 8:08
    Here, we've got Bob and Alice again,
  • 8:08 - 8:10
    who also want to communicate securely.
  • 8:10 - 8:12
    They simply create accounts on ProtonMail,
  • 8:12 - 8:15
    which is quite simple
    and takes a few moments,
  • 8:15 - 8:17
    and all the key encryption and generation
  • 8:17 - 8:19
    is happening automatically
    in the background
  • 8:19 - 8:21
    as Bob is creating his account.
  • 8:21 - 8:24
    Once his account is created,
    he just clicks "compose,"
  • 8:24 - 8:27
    and now he can write his email
    like he does today.
  • 8:27 - 8:28
    So he fills in his information,
  • 8:28 - 8:32
    and then after that,
    all he has to do is click "send,"
  • 8:32 - 8:35
    and just like that,
    without understanding cryptography,
  • 8:35 - 8:39
    and without doing anything different
    from how he writes email today,
  • 8:39 - 8:41
    Bob has just sent an encrypted message.
  • 8:41 - 8:46
    What we have here
    is really just the first step,
  • 8:46 - 8:48
    but it shows with encryption technology,
  • 8:48 - 8:52
    privacy doesn't have to be difficult,
    it doesn't have to be disruptive.
  • 8:52 - 8:57
    If we change the goal from maximizing
    ad revenue to protecting data,
  • 8:57 - 8:59
    we can actually make it accessible.
  • 8:59 - 9:01
    Now, I know a question
    on everybody's minds is,
  • 9:01 - 9:04
    okay, protecting privacy,
    this is a great goal,
  • 9:04 - 9:06
    but can you actually do this
  • 9:06 - 9:09
    without the tons of money
    that advertisements gives you?
  • 9:09 - 9:11
    And I think the answer is actually yes,
  • 9:11 - 9:14
    because today, we've reached a point
  • 9:14 - 9:18
    where people around the world really
    understand how important privacy is,
  • 9:18 - 9:21
    and when you have that,
    anything is possible.
  • 9:21 - 9:22
    Earlier this year,
  • 9:22 - 9:25
    ProtonMail actually had so many users
    that we ran out of resources,
  • 9:25 - 9:28
    and when this happened,
    our community of users got together
  • 9:28 - 9:30
    and donated half a million dollars.
  • 9:30 - 9:33
    So this is just an example
    of what can happen
  • 9:33 - 9:36
    when you bring the community together
    towards a common goal.
  • 9:36 - 9:37
    We can also leverage the world.
  • 9:38 - 9:39
    Right now,
  • 9:39 - 9:42
    we have a quarter of a million people
    that have signed up for ProtonMail,
  • 9:42 - 9:44
    and these people come from everywhere,
  • 9:44 - 9:45
    and this really shows that privacy
  • 9:45 - 9:48
    is not just an American
    or a European issue,
  • 9:48 - 9:50
    it's a global issue
    that impacts all of us.
  • 9:50 - 9:54
    It's something that we really
    have to pay attention to going forward.
  • 9:54 - 9:57
    So what do we have to do
    to solve this problem?
  • 9:57 - 9:59
    Well, first of all,
  • 9:59 - 10:02
    we need to support a different
    business model for the Internet,
  • 10:02 - 10:04
    one that does not rely
    entirely on advertisements
  • 10:04 - 10:06
    for revenue and for growth.
  • 10:06 - 10:09
    We actually need to build a new Internet
  • 10:09 - 10:14
    where our privacy and our ability
    to control our data is first and foremost.
  • 10:14 - 10:16
    But even more importantly,
  • 10:16 - 10:21
    we have to build an Internet
    where privacy is no longer just an option
  • 10:21 - 10:23
    but is also the default.
  • 10:24 - 10:26
    We have done the first step
    with ProtonMail,
  • 10:26 - 10:30
    but this is really just the first step
    in a very, very long journey.
  • 10:30 - 10:33
    The good news I can share
    with you guys today,
  • 10:33 - 10:36
    the exciting news,
    is that we're not traveling alone.
  • 10:36 - 10:38
    The movement to protect people's privacy
    and freedom online
  • 10:38 - 10:40
    is really gaining momentum,
  • 10:40 - 10:43
    and today, there are dozens of projects
    from all around the world
  • 10:43 - 10:47
    who are working together
    to improve our privacy.
  • 10:47 - 10:51
    These projects protect things
    from our chat to voice communications,
  • 10:51 - 10:53
    also our file storage, our online search,
  • 10:53 - 10:56
    our online browsing,
    and many other things.
  • 10:56 - 11:00
    And these projects are not backed
    by billions of dollars in advertising,
  • 11:00 - 11:02
    but they've found support
    really from the people,
  • 11:02 - 11:05
    from private individuals like you and I
    from all over the world.
  • 11:05 - 11:09
    This really matters, because ultimately,
  • 11:09 - 11:12
    privacy depends on each
    and every one of us,
  • 11:12 - 11:15
    and we have to protect it now
    because our online data
  • 11:15 - 11:18
    is more than just a collection
    of ones and zeros.
  • 11:18 - 11:19
    It's actually a lot more than that.
  • 11:19 - 11:22
    It's our lives, our personal stories,
  • 11:22 - 11:24
    our friends, our families,
  • 11:24 - 11:28
    and in many ways,
    also our hopes and our aspirations.
  • 11:28 - 11:31
    We need to spend time now
    to really protect our right
  • 11:31 - 11:34
    to share this only with people
    that we want to share this with,
  • 11:34 - 11:36
    because without this,
    we simply can't have a free society.
  • 11:36 - 11:39
    So now's the time for us
    to collectively stand up and say,
  • 11:39 - 11:43
    yes, we do want to live
    in a world with online privacy,
  • 11:43 - 11:47
    and yes, we can work together
    to turn this vision into a reality.
  • 11:47 - 11:49
    Thank you.
  • 11:49 - 11:56
    (Applause)
Title:
Think your email's private? Think again
Speaker:
Andy Yen
Description:

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
12:09

English subtitles

Revisions Compare revisions