The best tablets in 2024: top 11 tablets you can buy now



encrypted room database :: Article Creator

Best Encryption Software Of 2024

The best encryption software makes it simple and easy to protect your data, files or folders, and keep them secret, safe, and private.

Best encryption software: quick menu

Encryption software has become increasingly important, as it's become easier than ever for hackers, rogue apps, and even media giants to be able to access your personal details, and even your data.

For personal users this can mean anything from your personal files to all of your photos being potentially exposed or even deleted by a malware attack, which could be devastating.

For businesses it's even more serious, as they have a legal duty to protect customer records, and if hacked the exposure of any sensitive or confidential information can result in steep fines, brand damage, and long-term financial loss.

While there are a number of security solutions available, everything from free anti-malware tools for home consumers and cloud anti-virus for business, even simple human error can undermine these attempts to secure data.

Encryption software is already deployed by some large corporations and government agencies to protect data, but it's also available and now accessible for a wider range of users.

Once properly setup, even if your security software fails, thieves/hackers/snoopers would still find it almost impossible to do anything with any encrypted data that might be exposed.

Below we list the best encryption software tools.

We've featured the best ransomware protection.

The best encryption software of 2024 in full:

Why you can trust TechRadar We spend hours testing every product or service we review, so you can be sure you're buying the best. Find out more about how we test.

Best encryption software overall

(Image credit: Microsoft)

Keep your documents secured

Reasons to buy +

Huge file storage

+

Choose files to encrypt

+

Office integration

Microsoft OneDrive may not be the first option that comes to people's minds when they think of encryption software, but what a lot of people don't realize is that it comes with its own secure and encrypted file storage area in the form of the Personal Vault.

You can choose which files and folders to include, and these will become locked and encrypted. However, while the default is for only you to be able to access them, there is the option to share specific files and folders with other users.

This is great because OneDrive works really well as a small business and personal cloud storage solution, so the ability to encrypt files is a great bonus.

Additionally, OneDrive is an excellent choice for anyone who is committed to using Microsoft's services, as it offers neat integration with Outlook.Com, the company's popular email platform, for instance. OneDrive also ties in nicely with Windows and there is a selection of reasonable mobile apps to facilitate access on the move. 

For personal use, pricing starts at around $7 / £6 / AU$10 per month or $70 / £65 / AU$100 yearly.+

Read our full Microsoft OneDrive review.

Best encryption software for individuals

(Image credit: NewSoftwares)

Effective encryption for individuals

Reasons to buy +

Free to download basic version

+

Effective personal encryption

Although it's important to protect assets on company computers, it's also crucial to add protection to any device that stores critical data. For instance, most employees have access to their company emails and other accounts on their smartphones, and they need to be protected.

Folder Lock is a good option when it comes to adding encryption to your mobile devices. The app can protect your personal files, photos, videos, contacts, wallet cards, notes and audio recordings stored in your handset. 

There are some other hidden security features, too. Not only is there encryption, but you can also set a decoy password, hacker deterrents, log unauthorized login attempts, back up all your passwords and get notified on potential brute-force attacks. 

The basic app is free to download, with a pro version available for a one-time fee which opens up more advanced and useful security features for around $40 / £35 / AU$60.

Read our full Folder Lock review.

Best encryption software for small teams

(Image credit: AxCrypt)

Encryption for small teams and individuals

Reasons to buy +

Strong encryption for personal use

+

Free version available

While free software can be convenient for some, it's not always as powerful as premium offerings, and AxCrypt is a good bet if you want something reliable. The software has been designed specifically for individuals and small teams within businesses. 

It provides strong security, with files protected by either 128-bit or 256-bit AES encryption, which should thwart any intruders. There are also cloud storage capabilities thrown into the mix – the software will automatically protect files saved on services such as Google Drive and Dropbox.

AxCrypt is fully multilingual, and it can work with languages such as Dutch, French, German, Italian, Korean, Spanish, Swedish, Russian and Portuguese – with more support planned for the future. As well as this, there's passport management, and you can access your encrypted files through a smartphone app.

There is a free version but it's very limited and perhaps best thought of as a way to trial the software and help become used to the interface and basic functions.

Read our full AxCrypt encryption tool review.

Best encryption software for free

(Image credit: VeraCrypt)

Free encryption for everyone

Reasons to buy +

Basic version is completely free

+

Provides effective encryption

Reasons to avoid -

Selective approach

-

Initial download is a bit confusing

VeraCrypt is one of the most popular security tools, providing you with enterprise-grade encryption for important data.

The system is quite easy to use, and all it really does is add encrypted passwords to your data and partitions. All you have to do is give the tool a few details about your data, such as volume size, location and specified hashing algorithms – and then the program does its thing.

What's also nifty about VeraCrypt is that it's immune to brute-force attacks, so you never have to worry about hackers decrypting your passwords and other sensitive data. The basic version of the software is completely free, as well.

Read our full VeraCrypt review.

Best encryption software for compression

(Image credit: Cypherix)

Encryption with compression

Reasons to buy +

Strong encryption

+

Compresses files to make them easier to manage

Reasons to avoid -

Takes longer than other programs

Secure IT from Cypherix is a file encryption program that also compresses your files. This means that it may take a little longer than some other programs, but it does mean your files are potentially more manageable after.

Secure IT 2000 offers file and folder encryption, compression and file shredding all in one with command line processing and secure emails. It runs on all versions of Windows (32-bit as well as 64-bit).

A master password is required to access any files, which can be a little limiting if you'd prefer to have different passwords for different files, not least if you're looking to share some of them with family and/or friends.

Read our full Secure IT review.

Other Encryption Software to consider

Concealer is a file encryption program specifically for Apple Mac computers. Rather than encrypt all files on your harddrive, instead it provides an encrypted area for you to drag files into - which means you need to ensure you delete the original copy so as to avoid having both encrypted and non-encrypted versions on your harddrive. You can also choose your preferred encryption strength as 128 or 256-bit.

Renee File Protector is another piece of file encryption software for Windows, but this one allows you to have different passwords for different files or folders, effectively creating multiple security levels. Alternatively, you can just stick with a master password if required. And if you forget any of your passwords, Renee File Protector can provide prompts to allow you to recover them, which is handy.

SensiGuard doesn't just encrypt your files and folders, it also hides them so that they will remain hidden from unauthorized users, which is a potentially useful feature. Additionally, you can also securely shred files, which means that it's even harder for hackers to locate any sensitive files on your harddrive that you've already encrypted, or deleted. 

We've featured the best business VPN.

Best encryption software FAQs Which encryption software is best for you?

When deciding which encryption software to use, first consider what your actual needs are, as budget software may only provide basic options, so if you need to use advanced tools you may find a more expensive platform is much more worthwhile. Additionally, higher-end software can usually cater for every need, so do ensure you have a good idea of which features you think you may require from your encryption software.

How we tested the best encryption software

To test for the best encryption software we first set up an account with the relevant software platform, then we tested the service to see how the software could be used for different purposes and in different situations. The aim was to push each encryption software platform to see how useful its basic tools were and also how easy it was to get to grips with any more advanced tools.

Read more on how we test, rate, and review products on TechRadar.

Get in touch
  • You've reached the end of the page. Jump back up to the top ^

  • How To Enable Or Disable BitLocker For Encrypted Data Drives In Windows 11/10

    In this post, we will show you how to enable or disable BitLocker to encrypt or decrypt fixed and removable data drives in Windows 11 or Windows 10. BitLocker is a feature that can help you encrypt the drives on your computer. When you enable BitLocker, new files are automatically encrypted when you add them to a drive. When you copy these files to another drive or a different PC, they're automatically decrypted.

    How to Enable or Disable BitLocker in Windows 11/10

    Let us see how to Turn On or Off BitLocker to encrypt or decrypt fixed and removable data drives in Windows 11/10.

    Turn BitLocker On or Off for Data Drives

    To turn BitLocker on, open Explorer and right-click the data drive (eg. E: ) you want to encrypt and select Turn on BitLocker.

    Choose how (Password, Smart card, or Automatically) you want to unlock this drive, and click Next.

    The Automatically unlock this drive on this computer option will only be available only if the operating system drive has already been encrypted by BitLocker. Select how (Microsoft account, USB, file, and Print) you want to back up your BitLocker recovery key for this drive, and click Next. The Microsoft account option is only available when you are signed in to Windows 10 with a Microsoft account. It will then save the BitLocker recovery key to your OneDrive account online. Select the radio button for how much of your drive to encrypt (Encrypt entire drive is recommended) and click Next. Select the radio button for which encryption mode [New encryption mode (XTS-AES 128-bit) or Compatible mode (AES-CBC 128-bit)] to use, and click Next. Click Start encrypting when ready. Turn BitLocker On or Off for Data Drives The fixed data drive will now start encrypting. When encryption has completed, close the wizard. To turn BitLocker off, open an elevated command prompt, type the following command, and hit Enter. manage-bde -off <drive letter> Substitute <drive letter> in the command above with the actual drive letter of the encrypted drive you want to decrypt. Tip: You can check the status of BitLocker for the drive at any time. Turn BitLocker On or Off for Removable Data Drives BitLocker To Go is BitLocker Drive Encryption on removable data drives. This includes the encryption of USB flash drives, SD cards, external hard disk drives, and other drives formatted by using the NTFS, FAT16, FAT32, or exFAT file systems. To turn on Bitlocker for Removable Data Drives, open Explorer, right-click the removable data drive you want to encrypt, click Turn on BitLocker. Follow the same steps as mentioned above for fixed data drives. When encryption has completed, you'll receive a prompt. Click on Close. To turn Off Bitlocker for Removable Data Drives, open an elevated command prompt, type the following command, and hit Enter. manage-bde -off <drive letter> Substitute <drive letter> in the command above with the actual drive letter of the encrypted drive you want to decrypt. This post shows you in detail how to turn on or off the use of BitLocker on Removable Data Drives. Thus you can turn BitLocker on or off for both Fixed and Removable Data Drives in Windows 11/10. Does Windows 11 support BitLocker? BitLocker is a built-in feature in Windows 11/10 that helps users encrypt their hard drives. Windows 11 Home version does not support BitLocker. Hence, if you are a Windows 11 Home user and you want to use BitLocker, you have to upgrade your Windows 11 Home license to Windows 11 Pro, Enterprise, or Education edition. How do I check BitLocker status on Windows 11? You can check BitLocker encryption status for all the drivers on Windows 11 by executing a manage-bde -status command in Command Prompt or Get-BitLockerVolume command in Windows PowerShell. These commands will give you the BitLocker status for all the drivers. But if you want to check the BitLocker status for a particular hard drive partition, you have to run a separate command. That's it. I hope this helps.

    How Wi-Fi Sensing Became Usable Tech

    Over a decade ago, Neal Patwari lay in a hospital bed, carefully timing his breathing. Around him, 20 wireless transceivers stood sentry. As Patwari's chest rose and fell, their electromagnetic waves rippled around him. Patwari, now a professor at Washington University in St. Louis, had just demonstrated that those ripples could reveal his breathing patterns. 

    A few years later, researchers from MIT were building a startup around the idea of using Wi-Fi signals to detect falls. They hoped to help seniors live more independently in their homes. In 2015, their prototype made it to the Oval Office: by way of demonstration, one of the researchers tripped and fell in front of President Obama. (Obama deemed the invention "pretty cool.") 

    It's a tantalizing idea: that the same routers bringing you the internet could also detect your movements. "It's like this North Star for everything ambient sensing," says Sam Yang, who runs the health-sensor startup Xandar Kardian. For a while, he says, "investors just flocked in."

    Fast-forward nearly a decade: we have yet to see a commercially viable Wi-Fi device for tracking breathing or detecting falls. In 2022, the lighting company Sengled demonstrated a Wi-Fi lightbulb that could supposedly do both—but it still hasn't been released. The startup that made its case to Obama now uses other radio waves. One breathing-­monitor startup, called Asleep, set out to use Wi-Fi sensing technology but has pivoted to using microphones instead. Patwari also started his own company to make Wi-Fi breathing monitors. But, he says, "we got beaten out by Google." 

    Wi-Fi sensing as a way to monitor individual health metrics has, for the most part, been eclipsed by other technologies, like ultra-wideband radar. But Wi-Fi sensing hasn't gone away. Instead, it has quietly become available in millions of homes, supported by leading internet service providers, smart-home companies, and chip manufacturers. Wi-Fi's ubiquity continues to make it an attractive platform to build upon, especially as networks continually become more robust. Soon, thanks to better algorithms and more standardized chip designs, it could be invisibly monitoring our day-to-day movements for all sorts of surprising—and sometimes alarming—purposes.

    Yes, it could track your breathing. It could monitor for falls. It may make buildings smarter, and increase energy efficiency by tracking where people are. The flip side of this, however, is that it could also be used for any number of more nefarious purposes. Someone outside your home could potentially tell when it's vacant, or see what you are doing inside. Consider all the reasons someone might want to secretly track someone else's movements. Wi-Fi sensing has the potential to make many of those uses possible. What's more, this technology interprets the physical properties of electromagnetic waves, not the encrypted data they carry. It represents a new kind of privacy risk, and one for which safeguards are still being developed.

    Google's Sleep Sensing feature is built into its Nest Hub; it tracks breathing, snoring, and coughing for whoever is sleeping closest to the device, using not Wi-Fi sensing but a radar chip. Otherwise, Google's approach is basically the same as Patwari's: first use electromagnetic waves to sense tiny movements, and then use AI to make those movements make sense. The main difference is the length of the waves. Shorter wavelengths offer more bandwidth and thus more accuracy; longer wavelengths allow sensing over greater distances. The waves that ripple out from most Wi-Fi-enabled devices are two or five inches long: they can cover a lot of ground. The waves from Google's radar chip, in contrast, are just five millimeters long and can provide much more detail. To come even close, Wi-Fi sensing needs to look at how waves from multiple devices interact. But if it can do that, it will combine detail with range—without the need for special radar chips or dedicated devices like wearables. If Wi-Fi sensing becomes a default option in smart devices like lightbulbs—a push that is already beginning to take place—then those devices can start monitoring you. And as Wi-Fi sensing technology improves, these devices can start watching in more detail.

    Initially, says Patwari, "[Wi-Fi] resolution was pretty poor." Locations were accurate to only two meters, and two people chatting next to each other could look like one person. Over the past decade, researchers have been working to squeeze more information from the longer wavelengths used by commercial routers. More important, they are using AI to make sense of metadata that describes how waves scatter or fade, known as "channel state information." That gives them much more information to work with. Sixteen years ago, "we would be able to know pretty reliably that a person had walked by," Patwari says. "But now, people are getting gait information—what somebody's walking pattern is like." Still, while Wi-Fi sensing is getting more detailed, the reliability of those details remains iffy. "The signal is just not clean enough," says Yang. 

    If Wi-Fi sensing becomes a default option in smart devices—a push already taking place—those devices can start monitoring you.

    Meanwhile, AI advances that are helping Wi-Fi sensing improve are also helping radar. Some of the uses that made Wi-Fi sensing exciting a decade ago are now commercially available with dedicated radar devices that use shorter wavelengths.

    Inspiren, a radar company working in hospitals and long-term-care facilities, combines data from radars and cameras mounted above beds for fall detection. It both alerts staff to falls and flags the moments when frail patients are most at risk of falling, like when they get out of bed. Yang's sensor company sells an FDA-cleared medical device that can monitor heart rates from above hospital beds or jail cells—no wearables required. Some of these devices are already in use in Kentucky jails, where the goal is to help prevent overdoses and other medical emergencies. 

    Then there's a much creepier use case: spying through walls. Patwari earned a "Wi-Fi Signals Can See Through Walls" headline back in 2009 when the technology detected motion in another room. In January 2023 new versions of that headline reappeared, this time for a story about Carnegie Mellon researchers who used an AI engine called DensePose to generate body shapes from Wi-Fi signals. (The accuracy was far from perfect.) Radar that senses people through walls has existed for years; it is used by SWAT teams, border patrol, search-and-rescue teams, and the military. 

    Yet Daniel Kahn Gillmor, a staff technologist at the ACLU, has flagged Wi-Fi sensing by state actors as a potential privacy concern, particularly for activists. "We have lots of examples of law enforcement overreach," he says. "If law enforcement gains access to this data and uses it to harass people, it's another chunk of metadata that can be abused." 

    Wi-Fi sensing is already replacing other motion detection tools. It may also help make some current radar applications widely available—albeit with less reliability in many cases. In both contexts, Gillmor says, it could be used by corporations to monitor consumers, workers, and union organizers; by stalkers or domestic abusers to harass their victims; and by other nefarious actors to commit a variety of crimes. The fact that people cannot currently tell they are being monitored adds to the risk. "We need both legal and technical guardrails," Gillmor says.

    Wi-Fi sensing may also usher in new forms of monitoring. With its longer wavelengths, Wi-Fi could cover more ground than millimeter-wave radar. As the MIT team demonstrated back in 2015, it might eventually detect falls in private homes instead of hospitals. But there is a reason Google's Nest tracks breathing from one nightstand instead of from every lightbulb in the house: in the real world, context is hard for algorithms to parse. In a hospital room, a fall is probably a fall. In a home, Grandma falling looks a lot like a child jumping off the couch. So researchers are working on ways to reidentify known users. In addition to flagging falls, a tool like that could spot a burglar while a family is on vacation; depending on the settings and the context, it could also spot a teenager coming home after curfew, activists holding a meeting, or—in countries that enforce sodomy laws—two people of the same sex sleeping in the same bed.

    Of course, further along the electromagnetic spectrum, security cameras and nanny cams can already track individuals with ease. "You've got to remember: the context you get out of the camera is just crazy," says Taj Manku, CEO of the Wi-Fi sensing company Cognitive Systems. "You see the person's face. You see whether they're doing jumping jacks or they're doing exercise or they're doing something bad."

    But the mere fact that existing tools may achieve overlapping results, Gillmor says, does not lower the risk: "That way lies privacy nihilism." 

    Whether or not Wi-Fi can beat other sensors at their own games, integrating Wi-Fi sensing with those tools could eventually enhance the strengths of each. For now, commercial providers are taking advantage of Wi-Fi's range to focus on home security, along with one other area where they believe that Wi-Fi sensing is already the best solution. Spence Maid, CEO of the Wi-Fi sensing company Origin Wireless, puts it this way: "I hate to even say it, but—'Is Mom alive?'"    

    Until a year and a half ago, Emily Nikolich, 96, lived on her own in a condo in New Jersey. Each day, her grandchildren sent her new photos in an app on her tablet. Each day, Emily could spy on her five great-grandchildren, ages newborn to four. Meanwhile, her son Paul Nikolich, 68, was spying on her.

    In 2021, Paul installed a Wi-Fi sensing tool from Origin Wireless called Hex Home. Five small, glowing disks plugged in around Emily's home—with her permission—helped Paul to triangulate her position. He showed me the app. It didn't track Emily per se; instead, it tracked movement near each disk. But since Emily lived alone, the effect was the same: Paul could easily watch her daily journeys from bed to brunch to bathroom and back.

    It was "a relief," says Paul, to know that his mom was okay, even when he was traveling and couldn't call. So when Emily moved into an assisted living home last year, the monitors came with her. Hex has learned Emily's routine; if something out of the ordinary happens—if, for example, she stays in bed all day—it can send Paul an alert. So far, he hasn't had any. "Fortunately, she's been doing really well," he says. 

    In practice, Wi-Fi sensing still has a hard time with details. But it is very good at noticing human presence, regardless of walls or furniture. That accuracy, according to Manku? "It's 100%." That makes Wi-Fi sensing great for energy management (lightbulb maker WiZ uses it to turn the lights off in empty rooms) and for cutting back on false alarms from home security systems. It can also be helpful in places with aging populations. In Japan, Maid says, "they're having the mail delivery people knock on doors and make sure people are still alive." An Okinawa-based company is developing a proof-of-life service using Origin's technology.

    Manku estimates that at least 30 million homes already have some kind of Wi-Fi sensing available. One of Verizon's new Fios routers now ships with Origin Wireless's "human presence detection" built in. Stationary smart things already on the network—like lightbulbs, smart plugs, speakers, or Google Nests—can instantly become sensors. Other internet service providers are creating similar offerings; Cognitive Systems partners with more than 160 ISPs. This January, Cognitive Systems announced that its technology will soon be available in many of the cheap smart plugs for sale on Amazon, allowing people to use Wi-Fi sensing through their existing Google, Apple, and Amazon Alexa smart-home apps.

    Eventually, the Wi-Fi sensing companies I spoke with would like to go even bigger: serving not just homes and small businesses, but also larger office buildings or stores. Wi-Fi sensing, Manku says, could help firefighters locate people behind smoke too dense to see through; smart HVAC could leave the AC on for people working late. Occupancy data could help companies make post-pandemic downsizing decisions; foot-traffic data could inform in-store product placement. But to be useful in those complex scenarios, Wi-Fi would need to accurately count and locate lots of people. 

    Jie Yang, a researcher at Florida State University, is thinking bigger and in a slightly different direction: he is counting and locating people—and then tracking them individually. "Five years ago, most of the work focused on a single person," Yang says. "Right now, we are trying to target multiple persons, like a family." Recent research has focused on reidentifying target individuals when multiple people are present, using walking patterns or breathing rate. In a 2023 paper, Yang showed that it was possible to reidentify people in new environments. But for that research to work in the real world, even for just a handful of family members or employees, researchers won't just need better AI; they will also need better hardware. 

    That's where Emily's son Paul comes in. 

    For the past 22 years, the younger Nikolich has chaired an obscure but influential group within the Institute of Electrical and Electronics Engineers: the 802 LAN/MAN Standards Committee, which sets the technical standards for Wi-Fi and Ethernet compatibility. 

    In 2019, Nikolich attended an IEEE dinner in Washington, DC. Ray Liu, Origin Wireless's founder and a recent IEEE president, was sitting across the table from him, discussing Wi-Fi sensing with another attendee. Nikolich started listening in. He had been thinking about how to wire—and unwire—the internet since around the time URLs were invented. But here, suddenly, was something different. "I was very excited about it," Nikolich says. 

    Nikolich and Liu started talking, and Nikolich expressed his support for a subcommittee devoted to Wi-Fi sensing. Since 2020, the 802.11bf Task Group for WLAN Sensing, led by experts from companies like Huawei and Qualcomm, has been working on standards for chipmakers designed to make Wi-Fi sensing easier. Crucially, when the new standards go into effect, the channel state information that Wi-Fi sensing algorithms use will become more consistent. Right now, that information requires lots of qualifying and debugging. When the new standard comes out in 2025, it will allow "every Wi-Fi device to easily and reliably extract the signal measurements," Yang says. That alone should help get more Wi-Fi sensing products on the market. "It will be explosive," Liu believes.

    The longer-term use cases imagined by the committee include counting and finding people in homes or in stores, detecting children left in the back seats of cars, and identifying gestures, along with long-­standing goals like detecting falls, heart rates, and respiration.

    Where such goals are concerned, three other IEEE subcommittees may also make a difference. The first is 802.11be, better known as Wi-Fi 7. Wi-Fi 7, which rolls out this year, will open up an extra band of radio frequencies for new Wi-Fi devices to use, which means more channel state information for algorithms to play with. It also adds support for more tiny antennas on each Wi-Fi device, which should help algorithms triangulate positions more accurately. With Wi-Fi 7, Yang says, "the sensing capability can improve by one order of magnitude." 

    The Wi-Fi 8 standard, expected in a few years, could lead to another leap in detail and accuracy. Combined with more advanced algorithms, Yang says, Wi-Fi 8 could allow sensors to track not just a few people per router, but 10 to 20. Then, sharing information between routers could make it possible to count and track individuals moving through crowded indoor spaces like airports. 

    Finally, a less widely used standard known as WiGig already allows Wi-Fi devices to operate in the millimeter-wave space used by radar chips like the one in the Google Nest. If that standard ever takes off, it could allow other applications identified by the Wi-Fi sensing task group to become commercially viable. These include reidentifying known faces or bodies, identifying drowsy drivers, building 3D maps of objects in rooms, or sensing sneeze intensity (the task group, after all, convened in 2020).

    There is one area that the IEEE is not working on, at least not directly: privacy and security. For now, says Oscar Au, an IEEE fellow and member of the Wi-Fi sensing task group who is a vice president at Origin Wireless, the goal is to focus on "at least get the sensing measurements done." He says that the committee did discuss privacy and security: "Some individuals have raised concerns, including myself." But they decided that while those concerns do need to be addressed, they are not within the committee's mandate.

    When Wi-Fi signals are used to send data, the information being sent back and forth over the electromagnetic waves can be encrypted so that it can't be intercepted by hackers. But the waves themselves just exist; they can't be encrypted in quite the same way.

    "Even if your data is encrypted," says Patwari, "somebody sitting outside of your house could get information about where people are walking inside of the house—maybe even who is doing the walking." With time, skill, and the right equipment, they could potentially watch your keystrokes, read your lips, or listen to sound waves; with good enough AI, they might be able to interpret them. "I mean," Patwari clarifies, "the current technology I think would work best is looking inside the window, right?" 

    Wherever there is Wi-Fi, walls are now more porous. But right now, the only people who can do this kind of spying are researchers—and people who can replicate their results. That latter group includes state governments, Jie Yang confirms. "It's likely that this is already happening," Yang says. "That is: I don't know that people are actually doing that. But I'm sure that we are capable of doing that." 

    So more than a decade after he first started trying to use Wi-Fi signals to reveal location information, Patwari is now trying to do the opposite. Recently, he completed a project sponsored by the US Army Research Office, designing strategies to introduce noise and false positives into channel state information to make it harder for unauthorized devices to spy. The EU recently sponsored a project called CSI-MURDER (so called because it obfuscates, or kills, the channel state information). There are plenty of reasons to prevent eavesdropping; for one, Patwari says, the US Army might want "to make sure that they can provide Wi-Fi on a base or whatever and not have audio of what's going on inside the base eavesdropped outside." 

    Plenty of governments already spy on their own citizens, including the US and China—both hubs of Wi-Fi sensing research. That is a risk here too. Even though the most sensitive Wi-Fi sensing data is often stored locally, intelligence agencies could easily monitor that data in person—with or without a warrant or subpoena, depending on the circumstances. They could also access any reports sent to the cloud. For many Americans, though, the bigger privacy risk may come from ordinary users, not from government eavesdroppers. Gillmor notes that the tools already on the market for detecting human presence could create an extra hurdle for people experiencing domestic abuse. "I'm really glad to hear that a stalker would follow the Verizon terms of service, but color me a little bit skeptical," he adds.

    Palak Shah, who leads the social innovation lab at the National Domestic Workers Alliance, says she could imagine upsides for Wi-Fi sensing. "Wage theft is a very common problem in our industry," she says. A tool that helps nannies, housekeepers, or care workers prove they were in the home could help ensure proper payment. But, she says, "it's usually the case that things end up being used against the worker even if there's a potential for it to be used for them," and "that inherent power dynamic is really hard to disrupt."

    The National Domestic Workers Alliance has helped pass bills in several states to make it illegal to "monitor or record" in bathrooms. In comparison, Wi-Fi sensing is often touted as "privacy protecting" because it does not show naked bodies. But, Gillmor says, "just because it is a sensing mode that humans do not natively have does not mean that it can't be invasive."

    In another sense, Wi-Fi sensing is more concerning than cameras, because it can be completely invisible. You can spot a nanny cam if you know what to look for. But if you are not the person in charge of the router, there is no way to know if someone's smart lightbulbs are monitoring you—unless the owner chooses to tell you. This is a problem that could be addressed to some extent with labeling and disclosure requirements, or with more technical solutions, but none currently exist. 

    I asked Liu what advice he would give to lawmakers wrestling with these new concerns. He told me one senator has already asked. "This is a technology that can help change the world and make lives better. Elder care, security, energy management—everything," he says. "Nevertheless, we as a society need to draw a red line. Whatever the red line is—it's not my job to decide—here is the red line we do not cross."

    Meg Duff is a reporter and audio producer based in Brooklyn. She covers science, technology, and climate change.






    Comments

    Popular Posts

    Signal, WhatsApp and Telegram: All the major security differences between messaging apps - CNET

    WhatsApp beta update seeks to remind everyone why encryption is so vital - iMore

    VPN browser extensions: Why you shouldn't use then - Tech Advisor