All about encryption


by Kenny Wolf

Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds.

All About Encryption

This week we're diving into the backbone of modern private communication: the Messaging Layer Security (MLS) protocol. As E2EE becomes a necessity rather than a luxury, MLS aims to bring scalable, efficient, and standardized security to group messaging. Here's what stood out in the world of encryption and privacy.

Messaging Layer Security Protocol

The Messaging Layer Security Protocol (MLS) is a security layer for end-to-end encrypting (E2EE) messages. It's maintained by the MLS working group of the Internet Engineering Task Force (IETF), and is designed to provide an efficient and practical security mechanism.


What caught my eye this week

3.5 Billion WhatsApp Accounts Leaked

Even though with good intention to use E2EE, wrong implementations make protocols useless. Watch here.

Encrypt Your Mails with PGP

PGP (Pretty Good Privacy) is a standard for encrypted communication via email. Proton has a very good blog post explaining how it works.

Learn AES

AES (Advanced Encryption Standard) is THE encryption protocol used in web. The connection with which you're reading this newsletter is encrypted with AES. Watch here.


Tip of the Week

When you use the internet, you communicate with dozens of parties (directly and indirectly). Every communication is vulnerable to leaks, and any stored information can potentially be intercepted.

By using services with E2EE (and implementing them properly), you reduce the risk of plaintext data being exposed. For messaging, you can use Signal; for email, OpenPGP; and for end-to-end encrypted file storage in the cloud, ProtonDrive, for example.


Forward this to a friend who cares about online security.

Read more stories on the Clear Byte blog

Clear Byte

by Kenny Wolf

113 Cherry St #92768, Seattle, WA 98104-2205
Unsubscribe · Preferences

Clear Byte

Clear Byte decodes the hidden layers of hacking, forensics, and digital systems—delivering academic clarity in byte-sized, actionable insights for tech-curious minds.

Read more from Clear Byte

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Inside Apple Photo by Laurenz Heymann on Unsplash This week, Clear Byte takes a deep dive into the Apple ecosystem. From running Linux on M-series Macs to understanding the cryptographic heart of Apple’s systems. Apple has quietly expanded its security documentation, opened up its bug bounty program, and revealed...

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Surveillance, privacy and misuse Photo by Ennio Dybeli on Unsplash This week’s issue takes a closer look at how technology meant to improve safety can also threaten privacy. From Kazakhstan’s growing surveillance system powered by Western tech firms to the ongoing debates around digital rights in Europe and the UK,...

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Running AI Locally Photo by Igor Omilaev on Unsplash Curious about running your own AI, without sharing data or paying monthly fees? In this issue, we explore how to set up a local LLM (like ChatGPT) right on your own machine. Whether you’re privacy-conscious, budget-minded, or just love tinkering with tech, you’ll...