The term “end-to-end” is being thrown around like candy. Whether you’re a business owner or a consumer, you’ve seen the words “end-to-end” used to describe encryption, networking, and several other technology-related subjects. The problem is that the companies touting their products’ “end-to-end” capabilities don’t offer much of an explanation as to what this term actually means. Instead, they use it as marketing fluff. It’s time we change that and show you what the end-to-end principle is, how it applies to encryption, and why it’s important.

The End-to-End Networking Principle

As the term’s wording suggests, “end-to-end” can be explained very simply by describing it as a principle of eliminating intermediary processes. In other words, end-to-end systems try to travel the path of least resistance to deliver information faster. When you send a packet on the internet, your router sends the data to another router, which forwards it to another router, and so on and so forth until the data reaches its destination.

End-to-end transactions ensure that data packets jump through as few hoops as possible to get to their final destination, making the connection faster and more reliable.

End-to-End Encryption

endtoend-phone

So, what does the term “end-to-end” have to do with encryption? Unlike the networking principle, end-to-end encryption has little to do with completing the process faster.

Instead, end-to-end encryption refers to who can see your data. Let’s put it this way: When you send encrypted information, your computer already sends the unencrypted data somewhere to be encrypted. In between the two points, someone can snoop in and see what you’re sending. This is often the case in Wi-Fi connections, where your device broadcasts everything it sends on an open radio signal. This encryption is practically useless in such a connected and Wi-Fi-reliant world.

With end-to-end encryption, your computer encrypts the data before ever sending it anywhere. The moment it leaves whatever device you’re using, it’s already a bunch of gibberish no one can read! It’s not until the data reaches its final destination that it is decrypted and read. Yahoo started introducing this concept to their emails in August 2014. Google has done this for Gmail in June the same year.

End-to-end encryption ensures that nothing ever leaves your computer without first being transformed into complete unreadable gibberish that hackers won’t be able to decipher.

What Do You Do With Everything Else?

There are few applications you can use that allow you to actually use end-to-end encryption. When you log in to other apps through a public Wi-Fi network, at least some of the information you send will be unencrypted and visible to everyone who is listening. This will allow them to do unspeakable things to your accounts, no matter how strong your passwords are. Since not every application is using end-to-end encryption, I highly suggest that you use a virtual private network that will route everything you send via a completely remote and locked-down network.

If you have any further questions about end-to-end encryption, be sure to leave a comment below!

How to Add Links to Your WordPress Widget Titles

Do you use numerous widgets on your WordPress blog? Have you ever wished that you could add WordPress Widget Titles? If so, you’re in luck thanks to a WordPress plugin called Widget Title Links.

The Complete Guide to Avoid Scams on Craigslist

Craigslist is a popular place for people to buy and sell stuff. It is also a good hangout for fraudster to scam the user. This guide will teach you how to avoid scams on Craigslist.

How Is Simple Different From Traditional Banking?

Simple is an online service that seeks to change the way people manage their money, but just how is it different from traditional banking?

How BitTorrent DHT Peer Discovery Works

Peer discovery is an essential part of the BitTorrent protocol. It’s how its downloads happen so quickly: You connect to multiple people, and each of them upload a little piece of the file to you. This article explains how the whole BitTorrent DHT peer discovery process works.

Forget Everything Else: Exclude Browsing History When Searching via Chrome’s Omnibox

Don’t want your browsing history, previously typed URLs or bookmarks displayed when searching from Chrome’s Omnibox? Use this quick trick to exclude them.

Is Your Email Provider Leaking Your IP Address to Recipients? Here’s How to Find Out

If you care about your privacy, you need to make sure that your email provider is not leaking your IP address to recipients. Here’s the tool for the job!

How to Create QR Codes on DuckDuckGo

If you use DuckDuckGo as your default search engine and want to create QR codes quickly, you can now create them directly on DuckDuckGo.com. Here’s how.

How to Import your Instapaper Articles into Pocket

If you are planning to import Instapaper articles to Pocket, the procedure to is extremely easy and shouldn’t take more than a few minutes. Here’s how.

How to Add Confirmation Message Before Publishing a Post in WordPress

When you click the Publish button in WordPress, it turns the article live without prompting. To overcome this, you can get it to show a confirmation message before publishing.

How to Save Links Into a Google Spreadsheet in Chrome

When you need to do research that’s heavy on citations, you can use Citable to quickly save websites’ link and notes to a Google Spreadsheet document.

Can People Really Spy on Your Webcam?

There were news that the FBI was able to spy on people’s webcams without them knowing. How is this possible? Let find out how this hack was done.

Enable HTML5 Playback in Google Play Music

The default settings of Google Play Music in a web browser make uses of Adobe Flash. Alternatively, you can switch it over to run on HTML5. Here’s how you can enable HTML5 playback in Google Play Music.