WhatsApp Implements Encryption

A victory for privacy has been won after Whatsapp’s decision to encrypt end to end messaging.

The move means the company’s 1 billion user can send calls or texts to each other safe in the knowledge that it will not be intercepted by law enforcement, criminals or parties with ulterior motives.

Whatsapp has since its beginning been indelibly linked to Apple inc, who has long been criticised for their compliance with NSA protocol in allowing government agencies to access information and location of its users.

In choosing to encrypt its code, Whatsapp is allowing its customers full privacy when using the application.
Amnesty International released a statement claiming: “"Whatsapp's roll out of the Signal Protocol [encryption code], providing end to end encryption for its one billion users worldwide, is a major boost for people's ability to express themselves and communicate without fear.”

"This is a huge victory for privacy and free speech, especially for activists and journalists who depend on strong and trustworthy communications to carry out their work without putting their lives at greater risk."

Certainly there will be ramifications of the company’s decision and dissenting voices will arise. The app already had coding that made it difficult for law enforcement or hackers to access conversations between users but this step means that there is no way for any third party to access information shared on the platform.

By encrypting code, effectively communication sent from one device has html code scrambled by the device it is sent from. The only other device that can unscramble this code is the device that receives the code, which it then translates into a message or phone call.

Unlike Facebook, Twitter or Apple this means the user can be safe in the knowledge that whatever they speak about over the application will not be seen by anyone who they do not wish it to be seen by.
But, as much as this can be seen as a victory for free speech, and the power of democracy there are obvious caveats that have deep roots in the politics on which (predominantly Western) societies rely.
But this is not a black and white moral story.

Given its high level of encryption already many a drug deal and doubtless possibly murder has been planned out using the service.

The possibilities of the new function will undoubtedly lead to fears about terrorists being able to discuss their plans in frank terms. Detailing in specific terms exactly what their intentions are.
Further down the line and on a more day-to-day basis the secretive world of drug dealing and gang-related crime will be able to hide itself from the authorities that perhaps should k ow about it.
There will be no need for users to ask for a “a score” when needing a fix and no need for gang members to ask to “sort out” someone when organising a killing.

Both these issues are, by nature huge societal problems and lead to questions about exactly how much privacy citizens in a free society should be allowed if they are to lead to a more open forum for illicit behaviour that damages the stability they enjoy.

Whatapp’s decision does lead to questions about how much people from all stratas of society can get away with. Paranoia will always be part of our society and government intelligence is central to that, in that respect any trust users have in Whatsapp will be hard to gain.

One source, a small time drug dealer from East London who for very obvious reasons wished to remain anonymous said about the decision, and whether it would help his business claimed: “With Whatsapp, I’d definitely use it more frequently now I know it’s completely private, but I’d still be suspicious. There’s a lot of paranoia in this industry. Lot of crazy dudes [sic] who think it’s a scam. Honestly we’re in the Underworld so we already know how to get around the authorities.”

It remains to be seen just how much secrecy and exploitation can be caused by the decision and how much uproar it will cause. If politician’s and bankers can use it to hide their corruption, or drug dealers can peddle whatever there selling one thing is for certain.

If you have a conversation about your darkest secrets with someone you trust, only they will know about it.

By Jackson Mardon-Heath

You Might Also Read: 

WhatsApp U-turn On Privacy Gets EU Challenge:

« Biggest Data Leak Ever Exposes World's Most Rich & Powerful
The Darkest Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

London Office for Rapid Cybersecurity Advancement (LORCA)

London Office for Rapid Cybersecurity Advancement (LORCA)

LORCA's mission is to support the most promising cyber security innovators in growing solutions to meet the most pressing industry challenges and build the UK’s international cyber security profile.

Swascan

Swascan

Swascan is the first all-in-one, GDPR Compliant, Cloud Security Suite Platform. GDPR Assessment, Web Application Scan, Network Scan, Code Review.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.