WhatsApp Implements Encryption

A victory for privacy has been won after Whatsapp’s decision to encrypt end to end messaging.

The move means the company’s 1 billion user can send calls or texts to each other safe in the knowledge that it will not be intercepted by law enforcement, criminals or parties with ulterior motives.

Whatsapp has since its beginning been indelibly linked to Apple inc, who has long been criticised for their compliance with NSA protocol in allowing government agencies to access information and location of its users.

In choosing to encrypt its code, Whatsapp is allowing its customers full privacy when using the application.
Amnesty International released a statement claiming: “"Whatsapp's roll out of the Signal Protocol [encryption code], providing end to end encryption for its one billion users worldwide, is a major boost for people's ability to express themselves and communicate without fear.”

"This is a huge victory for privacy and free speech, especially for activists and journalists who depend on strong and trustworthy communications to carry out their work without putting their lives at greater risk."

Certainly there will be ramifications of the company’s decision and dissenting voices will arise. The app already had coding that made it difficult for law enforcement or hackers to access conversations between users but this step means that there is no way for any third party to access information shared on the platform.

By encrypting code, effectively communication sent from one device has html code scrambled by the device it is sent from. The only other device that can unscramble this code is the device that receives the code, which it then translates into a message or phone call.

Unlike Facebook, Twitter or Apple this means the user can be safe in the knowledge that whatever they speak about over the application will not be seen by anyone who they do not wish it to be seen by.
But, as much as this can be seen as a victory for free speech, and the power of democracy there are obvious caveats that have deep roots in the politics on which (predominantly Western) societies rely.
But this is not a black and white moral story.

Given its high level of encryption already many a drug deal and doubtless possibly murder has been planned out using the service.

The possibilities of the new function will undoubtedly lead to fears about terrorists being able to discuss their plans in frank terms. Detailing in specific terms exactly what their intentions are.
Further down the line and on a more day-to-day basis the secretive world of drug dealing and gang-related crime will be able to hide itself from the authorities that perhaps should k ow about it.
There will be no need for users to ask for a “a score” when needing a fix and no need for gang members to ask to “sort out” someone when organising a killing.

Both these issues are, by nature huge societal problems and lead to questions about exactly how much privacy citizens in a free society should be allowed if they are to lead to a more open forum for illicit behaviour that damages the stability they enjoy.

Whatapp’s decision does lead to questions about how much people from all stratas of society can get away with. Paranoia will always be part of our society and government intelligence is central to that, in that respect any trust users have in Whatsapp will be hard to gain.

One source, a small time drug dealer from East London who for very obvious reasons wished to remain anonymous said about the decision, and whether it would help his business claimed: “With Whatsapp, I’d definitely use it more frequently now I know it’s completely private, but I’d still be suspicious. There’s a lot of paranoia in this industry. Lot of crazy dudes [sic] who think it’s a scam. Honestly we’re in the Underworld so we already know how to get around the authorities.”

It remains to be seen just how much secrecy and exploitation can be caused by the decision and how much uproar it will cause. If politician’s and bankers can use it to hide their corruption, or drug dealers can peddle whatever there selling one thing is for certain.

If you have a conversation about your darkest secrets with someone you trust, only they will know about it.

By Jackson Mardon-Heath

You Might Also Read: 

WhatsApp U-turn On Privacy Gets EU Challenge:

« Biggest Data Leak Ever Exposes World's Most Rich & Powerful
The Darkest Web »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

Neural Defend

Neural Defend

Neural Defend is a deepfake detection technology with proprietary algorithms and an AI agentic multi-layered of solution.

QuantumGate

QuantumGate

QuantumGate are a team of world-class cryptographers, cybersecurity professionals and researchers. We help organizations protect their data assets in a post-quantum world.