
Credentials from
Internet Society DirectoryMay 25, 2025
May 25, 2025
History of Encryption Practices 
History of Encryption Practices
- Evolution of encryption practices
- Government involvement in encryption
- Back-door access to encrypted products
May 25, 2025
May 25, 2025
Advocacy for Encryption 
Advocacy for Encryption
- Encryption advocacy
- How to become an encryption advocate
- Structuring advocacy messaging by audience
May 25, 2025
May 25, 2025
Threats to Encryption 
Threats to Encryption
- Types of threats to encryption
- Methods that enable access to encrypted data
- Methods that involve access to users’ data before encryption or after decryption
May 25, 2025
May 25, 2025
What is Encryption? 
What is Encryption?
- Encryption definition
- How encryption protects your data
- Symmetric and asymmetric encryption
- End-to-end encryption communication
May 25, 2025
May 25, 2025
Encryption in Use 
Encryption in Use
- Data in transit
- End-to-end encryption
- Link layer security
- Transport layer security
May 25, 2025
May 25, 2025
Encryption Certificate 
Encryption Certificate
- Describe encryption concepts at a high level, and the benefits encryption offers to us individually and as a society.
- Find out why it is important, and the ways in which we rely upon strong encryption in our daily lives.
- Understand how and why efforts to weaken encryption pose a serious threat.
- Learn about various “backdoor access” proposals and why they are problematic.
- Learn about the Internet Society’s goals and activities related to supporting strong encryption and defending against threats to it.
- Discover what actions you can take to advocate for strong encryption in your community and beyond.