{"id":186117,"date":"2017-04-03T19:55:21","date_gmt":"2017-04-03T23:55:21","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-importance-of-data-encryption-in-our-everyday-cloud-the-ledger\/"},"modified":"2017-04-03T19:55:21","modified_gmt":"2017-04-03T23:55:21","slug":"the-importance-of-data-encryption-in-our-everyday-cloud-the-ledger","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/the-importance-of-data-encryption-in-our-everyday-cloud-the-ledger\/","title":{"rendered":"The importance of data encryption in our everyday cloud &#8211; The Ledger"},"content":{"rendered":"<p><p>    In a 2016 study on global encryption trends published by the    Ponemon Institute, encryption being used consistently across    businesses grew from 16 percent to 41 percent since 2005.  <\/p>\n<p>    Encryption converts any data into scrambled, unreadable text in    order to mask the information from potential hackers.  <\/p>\n<p>    WinMagic Data Security Solutions COO Mark Hickman says data    encryptors require three key goals to successfully protect    their information.  <\/p>\n<p>    The first is to make encryption manageable so you can manage    files on your network, cloud, and different devices. Second is    to enhance the user experience  encrypt the data without the    user having to be aware of it. The last part is no compromised    security: We cant compromise data security, even if it    improves manageability or user experience, said Hickman.  <\/p>\n<p>    UW Tacoma information technology graduate Sameer Hakimi    believes its important to encrypt. Nowadays, you never know    who has access to your information. If you dont keep your    info private, anyone can know anything about you, said Hakimi.  <\/p>\n<p>    Corporate businesses demand a high volume of security, but a    lack of protection exists for the average consumer. On March    23, the U.S. Senate voted to decrease regulation, which    allowed internet providers like Comcast and AT&T to share    consumers information with other companies. According to Hari    Sreenivasan of PBS NewsHour, this includes sharing browsing    data, history, financial, health, communication and location    information without your explicit permission.  <\/p>\n<p>    Youtuber Philip DeFranco, called the situation the beginning    to the end of privacy online.  <\/p>\n<p>    Despite his thoughts on the end of privacy, he has many options    to curtail data extraction. DeFranco stressed the importance of    data encryption by mentioning different ways for everyday    people to encrypt their information  such as the Tor browser    and virtual private networks.  <\/p>\n<p>    Encryption is your best friend, said DeFranco.  <\/p>\n<p>    Tor is a free online browser that, according to the Tor    website, encrypts all of your incoming and outgoing browsing    traffic and relays it through a number of volunteer nodes    before sending it to its destination. DeFranco says this    prevents internet providers from viewing the web pages the    browser selects.  <\/p>\n<p>    Hakimi says he has used Tor in the past, but feels as though    there are better ways to encrypt data.  <\/p>\n<p>    Tor is just a slower browser than Chrome, said Hakimi.  <\/p>\n<p>    A VPN is another way to stop service providers from knowing    your information. A VPN encrypts your entire web traffic,    stopping service providers from seeing your information.  <\/p>\n<p>      ILLUSTRATION BY ALEXX ELDER    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<br \/>\n<a target=\"_blank\" href=\"http:\/\/thetacomaledger.com\/importance-data-encryption-everyday-cloud\/\" title=\"The importance of data encryption in our everyday cloud - The Ledger\">The importance of data encryption in our everyday cloud - The Ledger<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In a 2016 study on global encryption trends published by the Ponemon Institute, encryption being used consistently across businesses grew from 16 percent to 41 percent since 2005.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/the-importance-of-data-encryption-in-our-everyday-cloud-the-ledger\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-186117","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/186117"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=186117"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/186117\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=186117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=186117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=186117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}