WhatsApp Implements Encryption

A victory for privacy has been won after Whatsapp’s decision to encrypt end to end messaging.

The move means the company’s 1 billion user can send calls or texts to each other safe in the knowledge that it will not be intercepted by law enforcement, criminals or parties with ulterior motives.

Whatsapp has since its beginning been indelibly linked to Apple inc, who has long been criticised for their compliance with NSA protocol in allowing government agencies to access information and location of its users.

In choosing to encrypt its code, Whatsapp is allowing its customers full privacy when using the application.
Amnesty International released a statement claiming: “"Whatsapp's roll out of the Signal Protocol [encryption code], providing end to end encryption for its one billion users worldwide, is a major boost for people's ability to express themselves and communicate without fear.”

"This is a huge victory for privacy and free speech, especially for activists and journalists who depend on strong and trustworthy communications to carry out their work without putting their lives at greater risk."

Certainly there will be ramifications of the company’s decision and dissenting voices will arise. The app already had coding that made it difficult for law enforcement or hackers to access conversations between users but this step means that there is no way for any third party to access information shared on the platform.

By encrypting code, effectively communication sent from one device has html code scrambled by the device it is sent from. The only other device that can unscramble this code is the device that receives the code, which it then translates into a message or phone call.

Unlike Facebook, Twitter or Apple this means the user can be safe in the knowledge that whatever they speak about over the application will not be seen by anyone who they do not wish it to be seen by.
But, as much as this can be seen as a victory for free speech, and the power of democracy there are obvious caveats that have deep roots in the politics on which (predominantly Western) societies rely.
But this is not a black and white moral story.

Given its high level of encryption already many a drug deal and doubtless possibly murder has been planned out using the service.

The possibilities of the new function will undoubtedly lead to fears about terrorists being able to discuss their plans in frank terms. Detailing in specific terms exactly what their intentions are.
Further down the line and on a more day-to-day basis the secretive world of drug dealing and gang-related crime will be able to hide itself from the authorities that perhaps should k ow about it.
There will be no need for users to ask for a “a score” when needing a fix and no need for gang members to ask to “sort out” someone when organising a killing.

Both these issues are, by nature huge societal problems and lead to questions about exactly how much privacy citizens in a free society should be allowed if they are to lead to a more open forum for illicit behaviour that damages the stability they enjoy.

Whatapp’s decision does lead to questions about how much people from all stratas of society can get away with. Paranoia will always be part of our society and government intelligence is central to that, in that respect any trust users have in Whatsapp will be hard to gain.

One source, a small time drug dealer from East London who for very obvious reasons wished to remain anonymous said about the decision, and whether it would help his business claimed: “With Whatsapp, I’d definitely use it more frequently now I know it’s completely private, but I’d still be suspicious. There’s a lot of paranoia in this industry. Lot of crazy dudes [sic] who think it’s a scam. Honestly we’re in the Underworld so we already know how to get around the authorities.”

It remains to be seen just how much secrecy and exploitation can be caused by the decision and how much uproar it will cause. If politician’s and bankers can use it to hide their corruption, or drug dealers can peddle whatever there selling one thing is for certain.

If you have a conversation about your darkest secrets with someone you trust, only they will know about it.

By Jackson Mardon-Heath

You Might Also Read: 

WhatsApp U-turn On Privacy Gets EU Challenge:

« Biggest Data Leak Ever Exposes World's Most Rich & Powerful
The Darkest Web »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Vention

Vention

Vention (formerly iTechArt) is the partner of forward-thinking tech leaders around the globe.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Cytomate

Cytomate

Cytomate is an AI-powered cybersecurity company specializing in security posture management and innovative threat intel.