AI SAFETY & ETHICS
Distributing the Keys for Private Access to the Web
Center for Democracy & Tech
•
Every lock needs a key, but that key only works if it’s in the hands of the person who needs to use it. That’s the fundamental challenge facing encrypted DNS and Encrypted Client Hello (ECH). These protocols can protect your browsing from prying eyes, but only if you can first obtain the cryptographic configurations that