Is You have privacy on internet?
Introduction
In this post, we will delve into the concept of the internet and its functioning, explore the aspect of privacy on the internet, and discuss asymmetric key encryption (GnuPG).
Disclaimer
The following information is intended for general informational purposes only and should not be considered as professional advice. The author and publisher of this blog are not responsible for any errors or omissions, or for any actions taken based on the information provided. Readers should consult with appropriate professionals or experts for specific advice tailored to their individual circumstances.In this post,
What is Internet and How it Works
Before we cover what the Internet is, we must define what a “network” is. A network is a group of connected computers that are able to send data to each other. A computer network is much like a social circle, which is a group of people who all know each other, regularly exchange information, and coordinate activities together.
The Internet is a vast, sprawling collection of networks that connect to each other. In fact, the word “Internet” could be said to come from this concept: interconnected networks.
Since computers connect to each other within networks and these networks also all connect with each other, one computer can talk to another computer in a faraway network thanks to the Internet. This makes it possible to rapidly exchange information between computers across the world.
The internet is not owned by any single entity or individual. It is a global network of computers and infrastructure that is owned and maintained by various organizations, governments, businesses, and individuals around the world. The internet operates through a decentralized system of interconnected networks, which allows information to flow between them. No single entity has ultimate control over the entire internet. Instead, different organizations and entities work together to ensure its functioning and development.
privacy on the internet
Privacy on the internet is a complex and evolving topic. While the internet provides numerous opportunities for communication, information sharing, and convenience, it also raises concerns about the privacy and security of personal information
When you request google.com, your request some thing like this:
Your Computer -> Your Router -> ISP (multiple) -> Google Router -> The Server
If yor requests is https, ssl has a public key from and your data are encrypted only the server has private key to decrypt the data
Asymmetric key encryption (GnuPG)
Arguing that you don’t care about the right to privacy because you have nothing to hide is no different from saying you don’t care about free speech because you have nothing to say. – Edward Snowden
Using encryption helps to protect your privacy and the privacy of the people you communicate with. Encryption makes life difficult for bulk surveillance systems. GnuPG is one of the tools that Snowden used to uncover the secrets of the NSA.
GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. GnuPG also provides support for S/MIME and Secure Shell (ssh).