WhatsApp Fixes Its Biggest Encryption Loophole

WhatsApp Fixes Its Biggest Encryption Loophole

It’s a complex solution to a longstanding issue, and one that sets a precedent for companies that don’t want to rely quite so extensively on the security of the world’s handful of dominant cloud providers .“We’ve been working on this problem for many years and to build this, we had to develop an entirely new framework for key storage and cloud storage that can be used across the world’s largest operating systems,” says WhatsApp product manager Calvin Pappas.

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

The UK Is Trying to Stop Facebook's End-to-End Encryption

The UK Is Trying to Stop Facebook's End-to-End Encryption

An early draft of the report, seen by WIRED, says that increased usage of end-to-end encryption would protect adults’ privacy at the expense of children’s safety, and that any strategy adopted by technology companies to mitigate the effect of end-to-end encryption will “almost certainly be less effective than the current ability to scan for harmful content.”.

Fleeing WhatsApp for Better Privacy? Don't Turn to Telegram

Fleeing WhatsApp for Better Privacy? Don't Turn to Telegram

Mimoun, the founder of the digital security nonprofit Horizontal, asked the participants to list messaging platforms that they'd heard of or used, and they quickly rattled off Facebook Messenger , WhatsApp , Signal , and Telegram .

How Law Enforcement Gets Around Your Smartphone's Encryption

How Law Enforcement Gets Around Your Smartphone's Encryption

“It just really shocked me, because I came into this project thinking that these phones are really protecting user data well,” says Johns Hopkins cryptographer Matthew Green, who oversaw the research.

Google Is Testing End-to-End Encryption in Android Messages

Google Is Testing End-to-End Encryption in Android Messages

Google has begun rolling out end-to-end encryption for Rich Communication Service , the text-messaging standard the industry giant is pushing as an alternative to SMS.As Ars reviews editor Ron Amadeo noted last year, RCS interest from carriers has been tepid, so Google has been rolling it out with limited support.

Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography

Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography

In 2018, Aayush Jain, a graduate student at the University of California, Los Angeles, traveled to Japan to give a talk about a powerful cryptographic tool he and his colleagues were developing.

Zoom Finally Has End-to-End Encryption. Here's How to Use It

Zoom Finally Has End-to-End Encryption. Here's How to Use It

It’s on by default for iMessage and WhatsApp , a staple of encrypted messaging platforms like Signal , and an optional feature in Facebook Messenger .With all of that out of the way, here’s how to actually use Zoom’s end-to-end encryption, if it’s right for you.

When Coffee Machines Demand Ransom, You Know IoT Is Screwed

When Coffee Machines Demand Ransom, You Know IoT Is Screwed

The same researchers found that version 2 of the iKettle and the then-current version of the Smarter coffee maker had additional problems, including no firmware signing and no trusted enclave inside the ESP8266, the chipset that formed the brains of the devices.

How to Boost WhatsApp’s Privacy and Better Protect Your Data

How to Boost WhatsApp’s Privacy and Better Protect Your Data

However, it’s worth stressing that the content of the messages you send isn’t shared, as Facebook doesn’t have access to them due to WhatsApp’s end-to-end encryption .WhatsApp collects more information about you than it shares with Facebook.

How to Protect the Data on Your Laptop

How to Protect the Data on Your Laptop

Make sure you have your own user account set up on your laptop, even if you're the only one who uses it—not only will this keep the kids from messing up your browser bookmarks when they want to play games, it'll also stop anyone else from accessing it.

Tired of Gmail? Try a Privacy-First Email Provider

Tired of Gmail? Try a Privacy-First Email Provider

While Gmail doesn’t scan the content of your emails to collect information for its advertising machines, data from your Google account is used to serve ads in your Gmail inbox.

Encryption-Busting EARN IT Act Advances in Senate

Encryption-Busting EARN IT Act Advances in Senate

The law enforcement operation lasted more than three months and was made possible through police access to a secure communications platform called EncroChat, which offered encrypted messaging, disappearing messages, and an emergency data wiping feature.

Julian Assange Faces New Conspiracy Allegations

Julian Assange Faces New Conspiracy Allegations

Security researchers have long insisted, though, that there is no technical way to build a backdoor in encryption for law enforcement that won't fundamentally undermine the protection.But Evil Corp's activity is notable, because the group was indicted by the Justice Department in December for hacking.

Zoom Reverses Course and Promises End-to-End Encryption for All Users

Zoom Reverses Course and Promises End-to-End Encryption for All Users

Crucially, to enable end-to-end encryption, free users will need to submit and verify an identifying piece of data, like a phone number.

Coder-Turned-Kingpin Paul Le Roux Gets His Comeuppance

Coder-Turned-Kingpin Paul Le Roux Gets His Comeuppance

One afternoon in late September 2012, Paul Calder Le Roux was sitting in a hotel room in Monrovia, Liberia, working out the final details of a large cocaine and methamphetamine deal with the head of a Colombian drug cartel.

Zoom's End-to-End Encryption Will Be for Paying Customers Only

Zoom's End-to-End Encryption Will Be for Paying Customers Only

"Free users for sure we don’t want to give that," Zoom CEO Eric Yuan said in a company earnings call on Tuesday referring to end-to-end encryption, "because we also want to work together with FBI, with local law enforcement in case some people use Zoom for a bad purpose.".

Look Out for This Covid-19 Excel Phishing Scam

Look Out for This Covid-19 Excel Phishing Scam

Wishbone is a site that lets you make an online poll; this week a hacker put 40 million of its user records for sale on the dark web.

Facebook Messenger Adds Safety Alerts—Even in Encrypted Chats

Facebook Messenger Adds Safety Alerts—Even in Encrypted Chats

Facebook today announced new features for Messenger that will alert you when messages appear to come from financial scammers or potential child abusers, displaying warnings in the Messenger app that provide tips and suggest you block the offenders.

The FBI Backs Down Against Apple—Again

The FBI Backs Down Against Apple—Again

After claiming for months that Apple alone could unlock the two iPhones of Pensacola, Florida shooter Mohammed Saeed Alshamrani, the agency announced today that it had managed to do so without Cupertino’s help—and without undermining the encryption that protects over 1 billion iOS devices worldwide.

Signal Threatens to Leave the US If EARN IT Act Passes

Signal Threatens to Leave the US If EARN IT Act Passes

The pandemic has fueled debate about contact-tracing apps, but researchers say that it is possible to design encryption schemes for such services in a way that would successfully protect user privacy.

WhatsApp Is at the Center of Coronavirus Response

WhatsApp Is at the Center of Coronavirus Response

For the 2 billion of those people who also use the encrypted communication service WhatsApp, now more than ever is a time for calling, messaging, and seeking trustworthy information.Cathcart says WhatsApp's priority, even more so during the pandemic, is to elevate accurate information and support fact-checking organizations around the world.

Facebook Says Encrypting Messenger by Default Will Take Years

Facebook Says Encrypting Messenger by Default Will Take Years

Millican's presentation at the conference, in fact, wasn't about how Facebook plans to pull off the transition to default encryption for Messenger, which currently offers the feature only through its Secret Conversations mode .

A Bug in Popular Android Phones Gives Hackers Full Control

A Bug in Popular Android Phones Gives Hackers Full Control

And we explained how the new Incognito Mode for Google Maps helps cover your tracks—and more importantly, all the ways in which it doesn't.For one thing, the affected devices are mostly older, although in many cases still widely in use.

Alleged 'Snake Oil' Crypto Firm Sues Over Boos at Black Hat

Alleged 'Snake Oil' Crypto Firm Sues Over Boos at Black Hat

In addition to legally targeting the conference, Crown Sterling has also filed suit against 10 "Doe" defendants, who it claims orchestrated a disruption of the company's sponsored talk at Black Hat. Grant's presentation, entitled "Discovery of Quasi-Prime Numbers: What Does this Mean for Encryption," was based on a paper called "Accurate and Infinite Prime Prediction from a Novel Quasi-PrimeAnalytical Methodology."

Hackers Could Decrypt Your GSM Phone Calls

Hackers Could Decrypt Your GSM Phone Calls

"We spent a lot of time looking at the standards and reading the implementations and reverse engineering what the key exchange process looks like," BlackBerry's Murray says.

Was Bitcoin Created by This International Drug Dealer? Maybe!

Was Bitcoin Created by This International Drug Dealer? Maybe!

After a month, I was able to convince a colleague with deep cryptocurrency knowledge, someone who’d followed every twist and turn of the Satoshi saga, that Le Roux was the odds-on solution to the mystery of who created bitcoin.

Google Turns to Retro Cryptography to Keep Datasets Private

Google Turns to Retro Cryptography to Keep Datasets Private

"The net result is that we can perform this computation without exposing any individual data and only getting the aggregate result," says Amanda Walker, a privacy tools and infrastructure engineering manager at Google.

A Plan to Stop Breaches With Dead Simple Database Encryption

A Plan to Stop Breaches With Dead Simple Database Encryption

That means MongoDB itself and cloud providers won't be able to access customer data, and a database's administrators or remote managers don't need to have access to everything either.

Google's Push to Close a Major Encrypted Web Loophole

Google's Push to Close a Major Encrypted Web Loophole

Which means that today, when you register a site through Google that uses ".app," ".dev," or ".page," that page and any you build off of it are automatically added to a list that all mainstream browsers, including Chrome, Safari, Edge, Firefox, and Opera, check when they're setting up encrypted web connections.