{"id":62643,"date":"2016-09-02T00:00:00","date_gmt":"2016-09-02T00:00:00","guid":{"rendered":"http:\/\/blog.mozilla.org\/foxtail\/2016\/09\/02\/five-superheroes-who-use-encryption-for-good\/"},"modified":"2016-09-02T00:00:00","modified_gmt":"2016-09-02T00:00:00","slug":"five-superheroes-who-use-encryption-for-good","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/","title":{"rendered":"Five Superheroes Who Use Encryption for Good"},"content":{"rendered":"<p>Conversation about online privacy and security has reached new highs over the last year. And, while strong encryption may be villainized in some cabinet meetings and campaign speeches, it\u2019s important to know that without strong encryption, both our online and offline lives could be exposed to harm from bad actors. Encryption is a critical component to each of us living freely online.<\/p>\n<p>With this in mind, we\u2019re nominating five superheroes to look out for our online freedoms\u200a\u2014\u200aeach of whom demonstrates how encryption powers are used for good.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>Barbara\u00a0Gordon<\/strong><\/h2>\n<figure id=\"attachment_7\" aria-describedby=\"caption-attachment-7\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-7 size-large\" src=\"http:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/15oP_LLl9-NGQLNV103GwOQ-600x284.jpeg\" alt=\"Image source: dcentertainment.com \/ Barbara Gordan (DC Comics)\" width=\"600\" height=\"284\" \/><figcaption id=\"caption-attachment-7\" class=\"wp-caption-text\">Image source: dcentertainment.com \/ Barbara Gordan (DC Comics)<\/figcaption><\/figure>\n<p>Barbara Gordon, also known as Batgirl or \u201cOracle,\u201d commonly aids Batman with her computer expertise. She sets up encrypted lines of communication that allow her to share private information with the Dark Knight. This intelligence helps Batman win fights against evil in the field. When using these secure lines, Barbara Gordon often refers to herself as \u201cO.\u201d<\/p>\n<p>Believe it or not, we\u2019re not so different from Barbara Gordon when we share our information online. If you logged into your bank account, email or social network today, chances are your username and password were encrypted, protecting you from third party spies. And maybe from the Joker.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>Captain\u00a0Midnight<\/strong><\/h2>\n<figure id=\"attachment_19\" aria-describedby=\"caption-attachment-19\" style=\"width: 622px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-19 size-full\" src=\"http:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-C73YiYSmXVwtt82nvoQIrw.jpeg\" alt=\"Image source: brokenfrontier.com \/ Captain Midnight (Dark Horse Comics)\" width=\"622\" height=\"263\" \/><figcaption id=\"caption-attachment-19\" class=\"wp-caption-text\">Image source: brokenfrontier.com \/ Captain Midnight (Dark Horse Comics)<\/figcaption><\/figure>\n<p>Captain Midnight heads up the Secret Squadron. This awesome squad takes on the task of fighting crime, sabotage and espionage. They use Code-O-Graphs\u200a\u2014\u200aencrypted communications devices\u200a\u2014\u200ato collaborate with one another as they develop plans to fight crime in the name of freedom.<\/p>\n<p>(Fun fact: Code-O-Graph Secret Decoder Rings were sold commercially in the mid-20th century intended for Captain Midnight fans,\u00a0<a href=\"https:\/\/blog.mozilla.org\/digitalcitizen\/2016\/08\/15\/six-times-encryption-made-it-to-the-movies\/\">including Ralphie in A Christmas Story<\/a>.)<\/p>\n<p>Everyday folks like us don\u2019t use decoder rings to communicate with each other today. But we do use email. Some of us even set up encryption (available through most email service providers) so that only the people we want to see our emails can actually read them. For example, email encryption is widely used among journalists to protect the privacy of their sources. You can, too. After all, nobody but your own secret squadron really needs to know how you felt about your Tinder date last night.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>Batman<\/strong><\/h2>\n<figure id=\"attachment_18\" aria-describedby=\"caption-attachment-18\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-18 size-large\" src=\"http:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-lrg4i5NQX0aOVEdiqbGp-A-600x338.jpeg\" alt=\"Image source: dccomics.com \/ Batman (DC Comics)\" width=\"600\" height=\"338\" \/><figcaption id=\"caption-attachment-18\" class=\"wp-caption-text\">Image source: dccomics.com \/ Batman (DC Comics)<\/figcaption><\/figure>\n<p>Bruce Wayne has karate skills, an indomitable will and an unmatched sense of justice. He\u2019s also the genius who created the enviable center for all intelligence: the Batcave.<\/p>\n<p>All systems in the Batcave are encrypted against unauthorized access. In fact, any attempt to breach the security of the Batcave triggers alerts sent to Batman himself (and also Oracle, mentioned earlier in this post).<\/p>\n<p>Though most of us don\u2019t see them, encrypted \u201cspaces\u201d like the Batcave exist in our world, too. Technology companies have servers that can encrypt stored information. If you use any sort of browser, your information is probably touching multiple servers every day.<\/p>\n<p>Computer systems have warning bells too, like the Batcave. But by the time you find out that someone has breached your system\u2019s security, they\u2019re already inside. Strong encryption drastically reduces the probability of a successful information retrieval. This level of encryption ensures that if a system breach does occur, your information has little chance of being accessed by the thieves.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>Rick Jones and the\u00a0Avengers<\/strong><\/h2>\n<figure id=\"attachment_17\" aria-describedby=\"caption-attachment-17\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-17 size-large\" src=\"http:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-HpVyA79Hqi7hfUK9Tszm9g-600x375.jpeg\" alt=\"Image source: wallup.net \/ Rick Jones and the Avengers (Marvel Comics)\" width=\"600\" height=\"375\" \/><figcaption id=\"caption-attachment-17\" class=\"wp-caption-text\">Image source: wallup.net \/ Rick Jones and the Avengers (Marvel Comics)<\/figcaption><\/figure>\n<p>Rick Jones and the rest of the Teen Brigade transmit real-time, private encrypted messages to alert each other when villains cast darkness or people need help. Teen Brigade members are regular allies and informants for the Avengers.<\/p>\n<p>Encrypted public-service communications that move from one source to several destinations are also common in the real world. For example, a global encrypted Internet communications network called\u00a0I-24\/7\u00a0allows Interpol agents and member countries to securely distribute information to other law enforcement bodies.<\/p>\n<p>Whether Interpol also uses I-24\/7 to contact Iron Man, Thor, Ant Man and the Wasp remains classified.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>Spider-Man<\/strong><\/h2>\n<figure id=\"attachment_16\" aria-describedby=\"caption-attachment-16\" style=\"width: 940px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-16 size-full\" src=\"http:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-SR1tXFHsoAIz0MAOe4jxdg.jpeg\" alt=\"Image source: Marvel \/ Spider-Man (Marvel Comics)\" width=\"940\" height=\"529\" \/><figcaption id=\"caption-attachment-16\" class=\"wp-caption-text\">Image source: Marvel \/ Spider-Man (Marvel Comics)<\/figcaption><\/figure>\n<p>Though Spider-Man often operates outside of the law, he uses his powers for good\u200a\u2014\u200aand NYPD Captain George Stacy knows it. Comics have hinted that George Stacy knows Spider-Man\u2019s true identity and even helps Peter Parker step away from school activities so that he can fight crime. What makes this possible is their encrypted dialogue\u200a\u2014\u200alanguage that only Spider-Man and George Stacy can understand.<\/p>\n<p>While encrypted dialogue is not always technological, it does get to the core of what encryption is and why it is important.<\/p>\n<p>Encryption, simply put, is the assurance that only parties meant to receive information and derive meaning out of it, do.<\/p>\n<p>Mozilla believes in the power of encryption. And in the power of superheroes. However, in the digital world, the good guys and the bad guys aren\u2019t as easy to spot. That\u2019s why we spend a lot of our time developing both the technology and the policy for a safer online life. Kind of like a superhero, who\u2019s part software engineer and part legal scholar. And all heart.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Let us know what you think. Which superhero is most suited for the job of protecting encryption?<\/strong><\/p>\n<p><em>If you\u2019d like to learn how encryption works and why it\u2019s key to protecting the internet,\u00a0<\/em><a href=\"https:\/\/advocacy.mozilla.org\/en-US\/encrypt\/codemoji\/1\"><em>we\u2019re here to help<\/em><\/a><em>.<\/em><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conversation about online privacy and security has reached new highs over the last year. And, while strong encryption may be villainized in some cabinet meetings and campaign speeches, it\u2019s important to know that without strong encryption, both our online and offline lives could be exposed to harm from bad actors. Encryption is a critical component [&hellip;]<\/p>\n","protected":false},"author":1198,"featured_media":20007,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,289374],"tags":[],"coauthors":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Five Superheroes Who Use Encryption for Good<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/\",\"url\":\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/\",\"name\":\"Five Superheroes Who Use Encryption for Good\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/15oP_LLl9-NGQLNV103GwOQ.jpeg\",\"datePublished\":\"2016-09-02T00:00:00+00:00\",\"dateModified\":\"2016-09-02T00:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/24e7e5c372231fdb67776f1f650c699e\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#primaryimage\",\"url\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/15oP_LLl9-NGQLNV103GwOQ.jpeg\",\"contentUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/15oP_LLl9-NGQLNV103GwOQ.jpeg\",\"width\":1600,\"height\":757,\"caption\":\"Image source: dcentertainment.com \/ Barbara Gordan (DC Comics)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Superheroes Who Use Encryption for Good\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/en\/\",\"name\":\"The Mozilla Blog\",\"description\":\"News and Updates about Mozilla\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/24e7e5c372231fdb67776f1f650c699e\",\"name\":\"Michaela Smiley (Thayer)\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/44e149ca12f5a85f719c1876227f9d8f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/73099c0dd4cb40dfc0be987e299effe7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/73099c0dd4cb40dfc0be987e299effe7?s=96&d=mm&r=g\",\"caption\":\"Michaela Smiley (Thayer)\"},\"url\":\"https:\/\/blog.mozilla.org\/en\/author\/mthayermozilla-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Superheroes Who Use Encryption for Good","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/","url":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/","name":"Five Superheroes Who Use Encryption for Good","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#primaryimage"},"image":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/15oP_LLl9-NGQLNV103GwOQ.jpeg","datePublished":"2016-09-02T00:00:00+00:00","dateModified":"2016-09-02T00:00:00+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/24e7e5c372231fdb67776f1f650c699e"},"breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#primaryimage","url":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/15oP_LLl9-NGQLNV103GwOQ.jpeg","contentUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/15oP_LLl9-NGQLNV103GwOQ.jpeg","width":1600,"height":757,"caption":"Image source: dcentertainment.com \/ Barbara Gordan (DC Comics)"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/five-superheroes-who-use-encryption-for-good\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/en\/"},{"@type":"ListItem","position":2,"name":"Five Superheroes Who Use Encryption for Good"}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/en\/#website","url":"https:\/\/blog.mozilla.org\/en\/","name":"The Mozilla Blog","description":"News and Updates about Mozilla","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/24e7e5c372231fdb67776f1f650c699e","name":"Michaela Smiley (Thayer)","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/44e149ca12f5a85f719c1876227f9d8f","url":"https:\/\/secure.gravatar.com\/avatar\/73099c0dd4cb40dfc0be987e299effe7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/73099c0dd4cb40dfc0be987e299effe7?s=96&d=mm&r=g","caption":"Michaela Smiley (Thayer)"},"url":"https:\/\/blog.mozilla.org\/en\/author\/mthayermozilla-com\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/62643"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/users\/1198"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/comments?post=62643"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/62643\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media\/20007"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media?parent=62643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/categories?post=62643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/tags?post=62643"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/coauthors?post=62643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}