WhatsApp Implements Encryption

A victory for privacy has been won after Whatsapp’s decision to encrypt end to end messaging.

The move means the company’s 1 billion user can send calls or texts to each other safe in the knowledge that it will not be intercepted by law enforcement, criminals or parties with ulterior motives.

Whatsapp has since its beginning been indelibly linked to Apple inc, who has long been criticised for their compliance with NSA protocol in allowing government agencies to access information and location of its users.

In choosing to encrypt its code, Whatsapp is allowing its customers full privacy when using the application.
Amnesty International released a statement claiming: “"Whatsapp's roll out of the Signal Protocol [encryption code], providing end to end encryption for its one billion users worldwide, is a major boost for people's ability to express themselves and communicate without fear.”

"This is a huge victory for privacy and free speech, especially for activists and journalists who depend on strong and trustworthy communications to carry out their work without putting their lives at greater risk."

Certainly there will be ramifications of the company’s decision and dissenting voices will arise. The app already had coding that made it difficult for law enforcement or hackers to access conversations between users but this step means that there is no way for any third party to access information shared on the platform.

By encrypting code, effectively communication sent from one device has html code scrambled by the device it is sent from. The only other device that can unscramble this code is the device that receives the code, which it then translates into a message or phone call.

Unlike Facebook, Twitter or Apple this means the user can be safe in the knowledge that whatever they speak about over the application will not be seen by anyone who they do not wish it to be seen by.
But, as much as this can be seen as a victory for free speech, and the power of democracy there are obvious caveats that have deep roots in the politics on which (predominantly Western) societies rely.
But this is not a black and white moral story.

Given its high level of encryption already many a drug deal and doubtless possibly murder has been planned out using the service.

The possibilities of the new function will undoubtedly lead to fears about terrorists being able to discuss their plans in frank terms. Detailing in specific terms exactly what their intentions are.
Further down the line and on a more day-to-day basis the secretive world of drug dealing and gang-related crime will be able to hide itself from the authorities that perhaps should k ow about it.
There will be no need for users to ask for a “a score” when needing a fix and no need for gang members to ask to “sort out” someone when organising a killing.

Both these issues are, by nature huge societal problems and lead to questions about exactly how much privacy citizens in a free society should be allowed if they are to lead to a more open forum for illicit behaviour that damages the stability they enjoy.

Whatapp’s decision does lead to questions about how much people from all stratas of society can get away with. Paranoia will always be part of our society and government intelligence is central to that, in that respect any trust users have in Whatsapp will be hard to gain.

One source, a small time drug dealer from East London who for very obvious reasons wished to remain anonymous said about the decision, and whether it would help his business claimed: “With Whatsapp, I’d definitely use it more frequently now I know it’s completely private, but I’d still be suspicious. There’s a lot of paranoia in this industry. Lot of crazy dudes [sic] who think it’s a scam. Honestly we’re in the Underworld so we already know how to get around the authorities.”

It remains to be seen just how much secrecy and exploitation can be caused by the decision and how much uproar it will cause. If politician’s and bankers can use it to hide their corruption, or drug dealers can peddle whatever there selling one thing is for certain.

If you have a conversation about your darkest secrets with someone you trust, only they will know about it.

By Jackson Mardon-Heath

You Might Also Read: 

WhatsApp U-turn On Privacy Gets EU Challenge:

« Biggest Data Leak Ever Exposes World's Most Rich & Powerful
The Darkest Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Actelis Networks

Actelis Networks

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT applications.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.