Watchtower ONLINE LIBRARY
Watchtower
ONLINE LIBRARY
English
  • BIBLE
  • PUBLICATIONS
  • MEETINGS
  • The Battle for Secrecy—You Are Involved!
    Awake!—2009 | August
    • In today’s digital world, banking, money transfers, and payments​—as well as medical, corporate, and government records—​are secured by means of complex encryptions. The ciphertext, in turn, is read by those who have the necessary decryption key to restore the data to its original form.

      Whereas a metal key usually has a set of grooves, a digital key is a string of zeros and ones in various combinations. Longer keys have more combinations and are thus harder to crack. An eight-bit key, for example, has 256 possible combinations, or permutations, whereas a 56-bit key has more than 72 quadrillion permutations. The present standard for encrypted Web browsing is 128-bit keys, which have 4.7 sextillion times more permutations than 56-bit keys!b

      Still, security breaches do occur. In 2008, for instance, federal prosecutors in the United States charged 11 men with what is thought to be the largest-ever case of identity theft. The group allegedly used laptop computers, wireless technology, and special software to capture numbers from credit cards and debit cards used for payment at cash registers.

      Is Your Confidential Data Safe?

      To be sure, the encryptions protecting your bank accounts and online transactions are extremely hard to crack. Yet, much also depends on you. The Bible says: “Shrewd is the one that has seen the calamity and proceeds to conceal himself, but the inexperienced have passed along and must suffer the penalty.” (Proverbs 22:3) So be shrewd and “conceal” yourself, as it were, from fraud and theft by doing at least the following:

      ◼ Use antivirus software on your computer.

      ◼ Employ a spyware-detection program.

      ◼ Install a firewall.

      ◼ Keep all of the above continually updated, and install security updates for your applications and operating system.

      ◼ Beware of links or attachments in e-mail or instant messages, especially if the mail is unsolicited and asks for personal information or for verification of a password.

      ◼ When transmitting sensitive data, such as credit card details, use encrypted connections, and log off the Web site when you have finished.c

      ◼ Choose passwords that are hard to guess, and protect them.

      ◼ Do not copy or run software from unknown sources.

      ◼ Regularly back up your files, and safely store the copies.

      If you follow those basic precautions and apply any others that may be advisable now and in the future, you at least improve your chances of winning your own battle for confidentiality and security.

  • The Battle for Secrecy—You Are Involved!
    Awake!—2009 | August
    • b A quadrillion is 1 followed by 15 zeros. A sextillion is 1 followed by 21 zeros.

      c Encrypted Web pages on Web browsers have secure-transaction symbols, such as a lock symbol or “https://​” in the address bar. The s means secure.

English Publications (1950-2026)
Log Out
Log In
  • English
  • Share
  • Preferences
  • Copyright © 2025 Watch Tower Bible and Tract Society of Pennsylvania
  • Terms of Use
  • Privacy Policy
  • Privacy Settings
  • JW.ORG
  • Log In
Share