Page 11 - Telecom Reseller MayJun 2016
P. 11




May/June 2016 Telecom Reseller 11
A false Sense of Security in Our Messaging Apps



I
n the last couple of weeks, we have seen 
consumer messaging giants WhatsApp security loopholes that hackers could exploit, With hacking and data breaches becoming 
and Viber retrospectively add end-to-end
PARKER
as the keys are stored on devices but is not clear increasingly prominent, consumers and businesses 
encryption technology to their communications how they are generated or if they are deleted, must be encouraged to think encryption  rst. But 
platforms.  e notion of providing users with or whether users’ messages are accessible from it is equally important to consider how secure the 
improved security is certainly to be applauded, by Jonathan Parker-Bray, CEO WhatsApp’s servers.
o ering they choose to protect their businesses 
and seeing messaging apps adopt encryption as of Pryvate (www.pryvatenow. com)
 e case of Viber is even more concerning.  e and personal communications actually is.  e vast 
a necessity as opposed to simply a nice-to-have ‘coloured lock’ that the company says signi es majority of o erings on the market from some 
feature, is long overdue.
whether messages are secured or not is simply a big, well-known businesses simply don’t make
However, the manner in which providers are Mainstream messaging concerns
marketing gimmick that gives users a complete the grade when it comes to o ering total security 
increasingly introducing encryption technology  is ideal of deploying true encryption is a far
false sense of security that their messages are and would not even come close to preventing 
within apps as an a erthought is potentially cry from what users receive with the likes of protected.  ere is no mention of how algorithms highly skilled cybercriminals from accessing users’ 
providing a false sense of security to the billions of WhatsApp and Viber. WhatsApp, for example, protect conversations or whether group messages communications.
people that use them on a daily basis.
has freely admitted that its new encryption service – of up to 200 users – are protected by a single It is vital that people take their digital 
 e reality is that messaging platforms like uses ‘derived keys’, which means that the company key or individual keys for each user. Its launch has communications seriously to ensure they can feel 
WhatsApp, Viber, and countless similar o erings has some access to keys before a conversation is failed to provide users with assurances that it is con dent and fully secure when they interact with 
on the marketplace do not provide users with a initiated and implies that it operates some form of operating a level of security anywhere near true friends, family members and colleagues at home, 
level of encryption that safeguards truly sensitive temporary storage.  is has the potential to create
encryption.
at work and while travelling. n
information – yet they continue to claim they do.
 e danger here is that the majority of users 
are unaware that there are di erent levels
of encryption, so when these apps describe 
themselves as being identical to those that o er 
higher levels of security, it is understandable
that consumers and business users believe them. 
Terms like end-to-end encryption, for example, 
can apply to vastly di erent systems and lead end 
users into a false sense of security that their calls, 
text messages, and instant messages are being sent 
securely.

The encryption epitome
 e public nature of data breaches making major 
news headlines is enlightening businesses and 
consumers on the risks of a potential breach when 
they use their smartphones to communicate
on a daily basis. So now, more than ever, it is 
imperative that communication services across 
email, voice calls, conference calls, video calls, and 
instant messenger are properly protected from 
cybercriminals, intruders, corporate espionage, 
and hackers.


True encryption applications 

hold no access to encryption 

keys and no records of any 

communications between 

users... nothing is seen or held by 
the provider and their networks 

are not involved.


 e state of cybercrime, whereby hackers
are more sophisticated than ever in their bid
to steal data for  nancial gain, necessitates the 
need for specialist communication applications 
with encryption at their core.  is means
people who truly care about the security of
their communications must move away from 
popular messaging platforms that simply deploy 
encryption as a bolt-on to their current o ering, in 
favour of true end-to-end encryption solutions.
 ese applications are built with security in 
mind from the ground up, with features like 
top-of-the-line RSA 4096-bit encryption, which
is essential as it ensures all business and personal 
communications remain truly private.  e key 
di erence that sets these applications apart from 
others on the market is that they set out with the 
sole intention of developing a suite of totally secure 
communication services.
True encryption applications hold no access 
to encryption keys and no records of any 
communications between users. All encryption 
keys are generated within the user’s app on their 
device and are automatically deleted once used 
with another 4096-bit key generated for each 
session – nothing is seen or held by the provider 
and their networks are not involved.




   9   10   11   12   13