HomeCrypto for AdvancedWhat are crypto wars

What are crypto wars

What are crypto wars

Crypto Wars is an unofficial term for attempts by the US and allied governments to restrict public and foreign access to strong cryptography in order to avoid decoding by national intelligence agencies.

The goal of these acts is clear: no one or nation can rely on encryption methods that are unbreakable by national spy agencies. As a result, no one would be safe from snooping by agencies like the NSA, the CIA, or the FBI. This condition stems from a difficult period in history, the Cold War. On the one hand, the Western block aimed to safeguard its communications and prevent the Eastern block from obtaining robust encryption technology. They, on the other hand, desired to do the same. Both camps sought to spy on each other at the same time, seeking for methods to break their systems. A circumstance that prompted some unusual responses.

During the first crypto war, in the 1990s, privacy campaigners and security experts fought against broad US cryptography export controls and purposeful encryption weakening. The outcome of the conflict is primarily to blame for the growing usage and availability of encryption techniques, as well as the global expansion of e-commerce. Steven Levy, a former Newsweek chief technology correspondent who literally wrote the book on the first crypto war in 2001, summed up the outcome in five words: "public crypto was our friend," implying that the US government's position shifted away from viewing cryptography solely as a threat to national security.

With the Snowden revelations in 2013, the world was engulfed in a second crypto war, which continues to this day. The current topic of disagreement is whether government agencies should have unrestricted access to communications data and the ability to unlock personal electronic devices.

To some kind of a crypto war, we can put governments efforts to make applications such as WhatsApp and Telegram decrypted, so they could access the conversations. WhatsApp for example has end to end encryption, which means that no third-party (even government) can not read or access it.

Check out other levels

We use cookies to store, access and process personal data to give you the best online experience. By clicking Accept Cookies you consent to storing all cookies and ensure best website performance. You can modify cookie preferences or withdraw consent by clicking Cookie Settings. To find out more about cookies and purposes, read our Cookie Policy and Privacy Policy

Cookies settings


Cookie Control


What are cookies?

Cookies are small text files that enable us, and our service provides to uniquely identify your browser or device. Cookies normally work by assigning a unique number to your device and are stored on your browser by the websites that you visit as well as third-party service providers for those website. By the term cookies other technologies as SDKs, pixels and local storage are to be considered.


If Enabled

We may recognize you as a customer which enables customized services, content and advertising, services effectiveness and device recognition for enhanced security
We may improve your experience based on your previous session
We can keep track of your preferences and personalize services
We can improve the performance of Website.


If Disabled

We won't be able to remember your previous sessions, that won't allow us to tailor the website according to your preferences
Some features might not be available and user experience reduced without cookies


Strictly necessary means that essential functions of the Website can not be provided without using them. Because these cookies are essential for the properly working and secure of Website features and services, you cannot opt-out of using these technologies. You can still block them within your browser, but it might cause the disfunction of basic website features.

  • Setting privacy preferences
  • Secure log in
  • Secure connection during the usage of services
  • Filling forms

Analytics and performance tracking technologies to analyze how you use the Website.

  • Most viewed pages
  • Interaction with content
  • Error analysis
  • Testing and Measuring various design effectivity

The Website may use third-party advertising and marketing technologies.

  • Promote our services on other platforms and websites
  • Measure the effectiveness of our campaigns