WhatsApp Implements Encryption

A victory for privacy has been won after Whatsapp’s decision to encrypt end to end messaging.

The move means the company’s 1 billion user can send calls or texts to each other safe in the knowledge that it will not be intercepted by law enforcement, criminals or parties with ulterior motives.

Whatsapp has since its beginning been indelibly linked to Apple inc, who has long been criticised for their compliance with NSA protocol in allowing government agencies to access information and location of its users.

In choosing to encrypt its code, Whatsapp is allowing its customers full privacy when using the application.
Amnesty International released a statement claiming: “"Whatsapp's roll out of the Signal Protocol [encryption code], providing end to end encryption for its one billion users worldwide, is a major boost for people's ability to express themselves and communicate without fear.”

"This is a huge victory for privacy and free speech, especially for activists and journalists who depend on strong and trustworthy communications to carry out their work without putting their lives at greater risk."

Certainly there will be ramifications of the company’s decision and dissenting voices will arise. The app already had coding that made it difficult for law enforcement or hackers to access conversations between users but this step means that there is no way for any third party to access information shared on the platform.

By encrypting code, effectively communication sent from one device has html code scrambled by the device it is sent from. The only other device that can unscramble this code is the device that receives the code, which it then translates into a message or phone call.

Unlike Facebook, Twitter or Apple this means the user can be safe in the knowledge that whatever they speak about over the application will not be seen by anyone who they do not wish it to be seen by.
But, as much as this can be seen as a victory for free speech, and the power of democracy there are obvious caveats that have deep roots in the politics on which (predominantly Western) societies rely.
But this is not a black and white moral story.

Given its high level of encryption already many a drug deal and doubtless possibly murder has been planned out using the service.

The possibilities of the new function will undoubtedly lead to fears about terrorists being able to discuss their plans in frank terms. Detailing in specific terms exactly what their intentions are.
Further down the line and on a more day-to-day basis the secretive world of drug dealing and gang-related crime will be able to hide itself from the authorities that perhaps should k ow about it.
There will be no need for users to ask for a “a score” when needing a fix and no need for gang members to ask to “sort out” someone when organising a killing.

Both these issues are, by nature huge societal problems and lead to questions about exactly how much privacy citizens in a free society should be allowed if they are to lead to a more open forum for illicit behaviour that damages the stability they enjoy.

Whatapp’s decision does lead to questions about how much people from all stratas of society can get away with. Paranoia will always be part of our society and government intelligence is central to that, in that respect any trust users have in Whatsapp will be hard to gain.

One source, a small time drug dealer from East London who for very obvious reasons wished to remain anonymous said about the decision, and whether it would help his business claimed: “With Whatsapp, I’d definitely use it more frequently now I know it’s completely private, but I’d still be suspicious. There’s a lot of paranoia in this industry. Lot of crazy dudes [sic] who think it’s a scam. Honestly we’re in the Underworld so we already know how to get around the authorities.”

It remains to be seen just how much secrecy and exploitation can be caused by the decision and how much uproar it will cause. If politician’s and bankers can use it to hide their corruption, or drug dealers can peddle whatever there selling one thing is for certain.

If you have a conversation about your darkest secrets with someone you trust, only they will know about it.

By Jackson Mardon-Heath

You Might Also Read: 

WhatsApp U-turn On Privacy Gets EU Challenge:

« Biggest Data Leak Ever Exposes World's Most Rich & Powerful
The Darkest Web »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

White Tuque

White Tuque

A new way to protect your organization. White Tuque is your partner in identifying threats, understanding your risk, and ensuring your business remains resilient.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.