1

The war against online censorship and surveillance recently saw a formidable development that could turn the tide in favor of internet freedom and privacy. Cloudflare, the notable internet infrastructure titan, has unveiled support for the Encrypted Client Hello (ECH) privacy feature, essentially creating a sanctuary for free speech advocates and challenging established site-blocking endeavors.

For the uninitiated, as TorrentFreak reported, web blocking has been the entertainment sector’s favored anti-piracy tool for over a decade and a half. Employed in more than forty nations, this method involves Internet Service Providers (ISPs) blocking access to specific websites, often under a legal directive. While it started with rudimentary DNS blockades, the system evolved, employing sophisticated Server Name Indication (SNI) eavesdropping techniques, or sometimes a mix. But it has also been used as a way for governments to censor websites and block access.

However, the landscape began shifting as privacy-centric technologies, like Encrypted DNS, emerged to challenge these blockades. Now, the introduction of ECH is poised to revolutionize this arena, making ISP’s surveillance efforts mostly, if not entirely, ineffective.

Described simplistically, ECH is an innovative privacy protocol engineered to mask internet traffic, thwarting any monitoring efforts. Browser giants like Chrome, Firefox, and Edge have already given a nod to its implementation. Yet, for its potential to be fully realized, websites must also incorporate it. Cloudflare’s decision to eventually integrate ECH by default in all its free plans, serving countless websites, signifies a giant stride towards widespread adoption.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here
this post was submitted on 09 Oct 2023
1 points (100.0% liked)

Encryption

171 readers
1 users here now

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information.

Rules

  1. Don't do unto others what you don't want done unto you.
  2. No Porn, Gore, or NSFW content. Instant Ban.
  3. No Spamming, Trolling or Unsolicited Ads. Instant Ban.
  4. Stay on topic in a community. Please reach out to an admin to create a new community.

founded 2 years ago
MODERATORS