BitDepthFeatured

Encryption, privacy and public safety

4 Mins read
  • Encryption is crucial for protecting digital privacy and securing sensitive information in our increasingly digital lives
  • Weakening encryption for public safety can create vulnerabilities and lead to misuse
  • Pretty Good Privacy (PGP), introduced in 1991, was one of the first public implementations of asymmetric encryption

Above: Illustration by aureilaki/DepositPhotos

BitDepth 1534 for October 27, 2025

Encryption is a key pillar of digital society, occupying a delicate space between privacy and public safety.

October 21 was Global Encryption Day and the TT Internet Society (ISOCTT), the CTU, the TT Computer Society and the local chapter of the Institute of Electrical and Electronic Engineers (IEEE) partnered to host a webinar discussion on the importance of this aspect of technology.

Introducing the presentation, moderator Kevon Swift, chairman of ISOCTT noted that, “Encryption day may sound like something for the tech savvy, but in truth it’s about all of us. Encryption is what keeps our messages private, our bank transactions secure and our digital lives, from health records to voice notes, protected from prying eyes”.

“In a world where nearly everything we do leaves a digital trace, encryption is less of an option and more of a civic safeguard. Around the world, governments are grappling with how to balance privacy with public safety.”

“Globally, proposals to weaken encryption through back doors or exceptional access tend to open much larger doors. Doors that invite misuse.”

Sachin Ganpat

Sachin Ganpat, secretary of the TT chapter of the IEEE, offered an explanation of how encryption works.

“You send messages. You send files. You shop. You bank. Each one of those actions transmits personal information,” Ganpat said.

“Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders. That’s sealing a letter that only the right person can open.”

“What does encryption look like in everyday life? We see it in WhatsApp. We see it when you browse websites secured using HTTPS. That S stands for secure. The latest Wi-Fi uses WPA3 AES256 encryption, the strongest encryption that we have to secure our connections to the access point. Many laptops and computers have that available today by default.”

Widespread use of hardware and transmission encryption was facilitated by the increasing speed of computer chips and solid state disk access.
MacOS using FileVault and Windows using BitLocker encrypt and decrypt data stored on a drive in real time without the perceptual overhead that limited widespread use of disk encryption on earlier devices.

Ganpat explained that there are two primary models for encryption, symmetric and asymmetric.

“In symmetric encryption, the plain text is run through an encryption key. That encryption algorithm requires the key to decrypt the plain text. In asymmetric encryption, the user and the algorithm produce two keys.”

“One key is known as a public key and the other, a private key. Someone sending you a file or data will use your public key to encrypt it. Then you use your private key to decrypt it. If you’re sending the file back to the person, you will use that person’s public key to encrypt the file, and they will use their private key to decrypt it.”

One of the earliest public implementations of asymmetrical encryption was Pretty Good Privacy (PGP) introduced in 1991. PGP initially faltered because it required users to master its learning curve. Early vulnerabilities limited its adoption by the technology savvy.

Image from Cisco.com

Later versions of PGP proved robust enough to frustrate law enforcement. As recently as 2007, police investigators could not open files secured with it.

Given enough time and resources, Ganpat noted, any encryption can be broken, and modern computers are capable of reducing that time dramatically, though not as speedily as quantum computers are expected to.

While there is no functioning quantum computer available to the public, as recently as last week, Google announced that it had successfully run an algorithm on a quantum chip 13,000 times faster than on existing chipsets.
Some systems secured by encryption are being advertised as being “ready” for such code cracking power, but practical challenges are still years away.

The other test that encryption faces is legal, as governments argue that being able to access encrypted data through digital backdoors is in the public interest.
This is an issue that Dr Raquel Gallo, a general counsel and head of legal at Brazil’s Network Information Center (NIC) has been considering.

“Often this effort is a false dichotomy between privacy and security, between encryption being a way to hide things and to protect criminals instead of saying this is a protection for us all,” Gallo said.

“These are legitimate concerns [by nation states] that they have to protect citizens, but there is a lack of awareness of the effects it might have. One example is luggage locks. These were very common in Brazil, but when you travel to US, you need to use one that is TSA approved with a key that only customs can open to check your luggage. Do you believe only customs can have this key?”

Brazil is in its ninth year of considering the consequences of government mandated access to encrypted messages in WhatsApp, having banned the app entirely temporarily in 2016.

Rishi Maharaj

Rishi Maharaj, managing director of Privicy Advisory Services, pointed out that such concerns are largely theoretical in Trinidad and Tobago leaving the country dramatically out of step with evolving standards in the EU and the wider Caribbean.

“The Data Protection Act of 2011 has never been fully implemented and is limited mainly to the public sector, leaving private organizations largely outside its regulatory scope,” Maharaj said.

“The absence of a comprehensive, enforceable regime means citizens lack meaningful rights over their personal data, while organizations operate without clear obligations or oversight. This gap carries real consequences.”

“The recent TSTT data breach exposed not only the vulnerabilities in cybersecurity but also the deeper issue of accountability. Individuals affected had no legal avenue to demand transparency, compensation, or corrective action. If Trinidad and Tobago is serious about building a digital society, it must first build a legal framework that protects those who participate in it.”

“Unchecked data collection and unregulated surveillance also threaten freedom and democracy. When individuals know they are being monitored, they self-censor. Journalists and activists are particularly vulnerable to state or corporate surveillance justified under “security” concerns. When data is weaponized, trust collapses, and civic participation declines— eroding the democratic fabric of our societies.”

Regional cybersecurity faces fire

Regional cybersecurity faces fire

Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Read More
Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Regional cybersecurity faces fire Regional cybersecurity faces fire
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Regional cybersecurity faces fire

4 Mins read
Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
FeaturedNews Briefs

Venture Credit Union announces recovery from ransomware attack

2 Mins read
The Qilin ransomware group has become increasingly active in the Caribbean in 2025.
Press Releases

iGovTT hosts first two-day cyberdrill

2 Mins read
The core of the event focused on practical skill-building and collaboration.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
1 month ago

[…] Trinidad and Tobago – Encryption is a key pillar of digital society, occupying a delicate space between privacy and public safety… more […]

1
0
Share your perspective in the comments!x
()
x