How to Encrypt Your Internet Traffic – Complete Guide

Updated on: 28 July 2020
Updated on:28 July 2020

As a regular internet user, you’ve probably heard the term encryption. Many internet users have no clue what encryption is, but it’s critical that you know why you need to encrypt your internet traffic, and how you can do so.

Prying eyes on the internet abound. That’s why most of the popular messaging applications, like WhatsApp and Viber, implement end-to-end encryption. You, too, should hide your data and bolster your defenses.

This article will serve as an in-depth guide on how to encrypt your internet journey. Cybercrime is rampant in this day and age — you don’t want to be caught vulnerable.

How to Encrypt Your Internet Traffic

What Is Encryption?

Generally, encryption means making data unreadable. The purpose of encryption is to secure your data from unauthorized access and to keep your privacy intact. Encryption uses cryptography techniques to scramble the messages or data you send so that it becomes unreadable to everything and everyone except that data’s intended recipient.

Encryption is an essential security tool to protect your sensitive data from the wrong hands.

Why Encrypt Your Internet Traffic?

A bunch of reasons! Here are some highlights:

  • To cover your browsing tracks. Tracking your browser history is sometimes useful when it comes to better product or movie suggestions. However, there will come a point when it feels too invasive. After all, you need your own personal space on the internet, too, right?
  • To stay safe from potential hackers. You might be thinking, Why would a hacker want my details anyway? I’m just an ordinary citizen. Well, don’t get complacent. If you’ve got money, that’s enough reason for a hacker to take interest in you and your online banking credentials. Hackers can observe your internet data, access your bank accounts, and rob you blind. Encryption can protect your login usernames and passwords from being seen by intruders.
  • To shield yourself from the prying eye of the government. Nowadays, the government loves to pry into internet traffic. You might think that they’re only trying to protect you from cultural exploitations and insecure websites, but there’s more to it than that. Many governments don’t respect their citizens’ privacy. And countries like China have many restrictions when it comes to people using the internet, especially social media.
  • To stay away from the prying eyes of ISPs, too. They’re not all that innocent either. ISPs are allowed to sell your internet data to advertisers and marketing agencies to boost their businesses. Some don’t even consider network neutrality. Whenever they see you do something that requires higher bandwidth, they can slow down your connection.

Convinced you need to encrypt your internet traffic? Good. Keep reading…

How to Encrypt Your Internet Traffic?

You’ve got some options:

  • Tor Browser
  • HTTPS
  • End-to-end encrypted messaging applications
  • Encryption in the local Wi-Fi network
  • A reliable VPN

Tor Browser

The best VPNs require you to purchase a subscription for maximal benefit. But another feasible solution to encrypt your data is by using the Tor Browser.

This is free software! It’s an open network that can help you stay anonymous and defend against potential cyber attackers and privy government agencies.

Those annoying third-party trackers and ads can’t follow you, as every website you visit is isolated by the browser. And your browsing history and cookies are cleared automatically when you finish your work. In a normal browser, that happens only manually, usually when an issue occurs.

The Tor Browser offers multi-layered encryption. It relays your internet traffic and encrypts three times when passing through the Tor network. Not only that, but it also gives you ways to defend against ISPs and governments watching your internet traffic.

You can download Tor Browser here.

TOR Main Page

HTTPS

The secure version of HTTP is known as the HyperText Transfer Protocol Secure (HTTPS). It’s primarily used for sending data between a website and a browser. So what makes this secure? HTTPS is encrypted so that the security of the transferred data is ensured.

TLS (Transport Layer Security) encryption techniques are used here, and HTTPS authenticates both the data sender and receiver at each end and makes sure that the data sent hasn’t been breached, ensuring integrity.

With an added layer of encryption with HTTPS, all your usernames, passwords, credit card information, and other sensitive information is protected. How do you know if the website you’re visiting has HTTPS enabled? Easy. Take a look at the URL in your browser, and you’ll see the address starting with “https://” if HTTPS is enabled. Otherwise, there will be a warning message in the URL: “Not Secure.”

The problem is that not every website makes use of HTTPS, but you can enable it using your browser settings and with the help of third-party applications.

How to enable SSL certificates in Chrome using Windows

1. Go to Settings.

Encryption Settings

2. Then click on System settings under the Advanced option.

3. Then click on “Open your computer’s proxy settings.”

Encrypt Your Traffic

4. Check the option box next to “Use TLS 1.2”.

TLS Settings

Using HTTPS everywhere

This is another option where you can enable HTTPS encryption. You can get the “HTTPS Everywhere” extension by the Electronic Frontier Foundation via the Chrome Web Store. Here’s how:

1. Go to the Chrome Web Store.

Chrome Web Store

2. Search for “HTTPS Everywhere” and click on the “Add to Chrome” button.

HTTPS Everywhere

3. Click on the “Add extension” button.

This extension is available for Firefox and Opera as well.

End-to-end encrypted messaging applications

Did you know that your standard SMS texts aren’t encrypted at all? That’s why it’s better to use messaging apps that offer end-to-end encryption. Third parties won’t be able to spy on your messages and monitor them.

So what exactly is end-to-end encryption?

End-to-end encryption (more commonly referred to as E2EE) guarantees that only you (one end) and the person you’re communicating with (the other end) can read and modify the data being transferred. Transferred data is encrypted on the sender’s end, and only the receiver’s end can decrypt it.

Let’s look at some of the popular messaging apps that offer these encryption facilities.

WhatsApp

Whatsapp

Owned by Facebook, WhatsApp is currently the most popular messaging platform in the world. You can send and receive messages, share images and videos, and take audio and video calls — all enabled with end-to-end encryption.

WhatsApp security guarantees that only the user and the person communicating with that user can read the sent messages. Not even WhatsApp itself can read the data.

The message you send is secured with a lock, and only the receiver of that particular message can unlock it with a special key and read the message. Not only that, but each message has a unique lock and key, which makes it more secure. WhatsApp does this automatically, and you don’t need to worry about how to turn the encryption on in the settings.

Viber

Viber

Viber didn’t have end-to-end encryption until version 6.0 was released. This release brought more security to its wide user range of over 900 million in the world.
Known as Rakuten Viber since 2017, it provides quality messaging and calling services, all secured with end-to-end encryption.

Wickr Me

Wickr Me is a private messenger application provided by Wickr, and it’s all about the privacy and security of your data. Wickr’s mission is to provide a secure communication platform trusted by individuals, teams, and corporations across industries, sizes, and scales, to manage their most valuable communications.

With its 256-bit, authenticated end-to-end encryption, only the intended receivers can read messages; not even Wickr can obtain the decryption keys. Wikr’s other advanced security features include multi-factor authentication, encryption of devices at rest, client network traffic obfuscation, detecting screenshots being taken, and many more.

Read more about Wickr security here.

Signal

Signal

Signal, which is a cross-platform messaging application across Android, iOS, macOS, Windows, and Linux operating systems, can be used to send messages to individuals or groups. These messages may consist of audio files, images, videos, and voice messages, which are all encrypted by Signal. It was built by the Signal Foundation and Signal Messenger LLC.

Signal invites you to share securely. It boasts state-of-the-art end-to-end encryption supported by the open-source Signal Protocol. Just like the apps above, no one — not even Signal itself — can listen to or read your messages.

Encryption in the Local Wi-Fi Network

This is the most basic option to start encrypting your internet traffic. Make sure you’ve set a password when joining your Wi-Fi network; otherwise, this is vulnerable to any attacks by anyone who can access the router. People nearby can freely access the router and thereby gain access to your internet traffic as well. Who knows what information they may see on your browsing history.

Encrypting your Wi-Fi connection is fairly easy:

1. Enter the IP address of the router in the address bar of your web browser and enter the admin panel. This is usually 192.168.1.0 or 192.168.1.1. If none of these work, try checking the bottom of your router to get the correct IP address.

2. Log in to the admin panel by entering the username and password.

ZTE Login

3. Click on the “Network” option and go to “Security” settings under “WLAN.”

ZTE WLan Settings

4. You’ll see several options under the authentication type. Enable WPA2-PSK. The other options — WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) — are much older versions of encryption and are considered to be more vulnerable to attack.

ZTE Settings

5. Next, set a strong password for your Wi-Fi router.

6. Finally, choose “AES” as your WPA encryption algorithm.

Router Encryption Settings

7. Save and exit.

A Reliable VPN

The best way to encrypt your data is with a reliable VPN (Virtual Private Network). By creating a private network from a public internet connection, a VPN protects your privacy online and keeps you anonymous. Your IP address is masked, so no one can track your activities online. The best thing is that the data that’s transferred is encrypted. So, in a nutshell, a VPN not only hides your identity, but also protects your data.

As a bonus, you can configure almost any internet-connecting device with a VPN, be it your mobile phone, your personal computer, and even your router.

Some of today’s best VPNs are ExpressVPN, NordVPN, SurfShark, VyprVPN, and IPVanish. Yes, some of these VPNs can be a bit expensive, but the benefits you’ll gain are worth the money. All these VPN vendors allow you to use the application with multiple devices using the same subscription.

How to encrypt your data with a VPN

1. Choose a VPN and create an account – we recommend ExpressVPN

ExpressVPN Pricing

2. Download ExpressVPN.

Download ExpressVPN

3. Log in to your account.

ExpressVPN Sign In

4. Activate your subscription.

ExpressVPN Activation Code

5. Connect to a server of your choice.

ExpressVPN UK Server

Different Types of Encryption

Now that you’ve got a good idea of encryption basics, let’s quickly explore a few other kinds of encryption. Here are the most popular:

  • Triple DES or Triple Data Encryption Standard. TDES applies the original DES cipher algorithm three times on every data block. Although it’s much slower than the single DES process, it provides more security.
  • Advanced Encryption Standard (AES). This is also called Rijndael and is known to be the best encryption mechanism so far. That’s probably why this is the standard encryption type in the United States. Symmetric key encryption is used by AES, where only one secret key is involved in encrypting and decrypting the information shared.
  • Rivest-Shamir-Adleman (RSA). RSA uses one-way asymmetric encryption. What makes it harder to decipher the data encrypted by RSA is its enormous key length, which can go up to 2048 bits.

What Else Can I Do to Protect Myself?

Encryption is a good start, but it’s just one line of defense. You’ve also got firewalls, strong passwords, better authentication methods, intrusion detection systems, antivirus software, and more. Technology is advancing day by day — for the good and the bad. So if you truly value your data and information, definitely consider diving more deeply into these other ways to bolster your defenses.

Written by: Shanika W.

Connect with him:

Shanika Wickramasinghe is a software engineer by profession. She works for WSO2, one of the leading open-source software companies in the world. One of the biggest projects she has worked on is building the WSO2 identity server which has helped her gain insight on security issues. She is keen to share her knowledge and considers writing as the best medium to do so. Cybersecurity is one of her favorite topics to write about. Being a graduate in Information Technology, she has gained expertise in Cybersecurity, Python, and Web Development. She is passionate about everything she does, but apart from her busy schedule she always finds time to travel and enjoy nature.

Leave a Reply

Your email address will not be published. Required fields are marked *