SlideShare ist ein Scribd-Unternehmen logo
1 von 15
LATEST UPDATES – A Review
• End To End Encryption
• Facebook Integration
By:
Govindarrajan NV
BIM,Trichy
END TO END ENCRYPTION
What is END To END Encryption?
• WhatsApp's end-to-end encryption is available when you and the people
you message use the latest versions of the app.
• WhatsApp's end-to-end encryption ensures only you and the person
you're communicating with can read what is sent, and nobody in between,
not even WhatsApp.
• This is because your messages are secured with a lock, and only the
recipient and you have the special key needed to unlock and read them.
For added protection, every message you send has its own unique lock
and key.
• All of this happens automatically: no need to turn on settings or set up
special secret chats to secure your messages.
Working
End To End Encryption - Advantages
• The new end-to-end encryption feature is based on the Signal Protocol,
designed by Open Whisper Systems.
• According to the technical White Paper on WhatsApp encryption, the end-
to-end encryption protocol has been designed to prevent third parties and
WhatsApp from having plaintext access to messages or calls.
• From now on, when you send any message to a group or an individual, the
data will only be visible to you and the group/individual you sent it to—no
one else can peep inside that message.
• A blog said: “No one can see inside that message. Not cyber criminals. Not
hackers. Not oppressive regimes. Not even Whatsapp. End-to-end
encryption helps to make communication via WhatsApp private – sort of
like a face-to-face conversation.”
• Now this is an amazing initiative, considering the exponential increase of
hackers in the recent past. With more people using smartphones and
instant messaging platforms for business, the new feature will certainly
assist users in keeping data protected from cyber criminals.
Contd..
• In fact, more businesses and organizations are excessively employing
mobile-based messaging platforms for discussing company policies, plans,
and other confidential details. In such a scenario, this feature will
definitely help in safeguarding data better.
• With the new end-to-end encryption feature, WhatsApp will not only
protect text messages, but will also secure photos, videos, voice
messages, documents, and even calls.
• Now individual users will be able to share data without any hiccups. As
mentioned earlier, WhatsApp claims that even they cannot access the
message.
• According to another blog, with the new update, all your messages on
WhatsApp will be secured with a lock and “only the recipient and you have
the special key”
to unlock and access them.
• “For added protection, every message you send has its own unique lock
and key. All of this happens automatically: no need to turn on settings or
set up special secret chats to secure your messages,” the blog added.
End To End Encryption - Disadvantages
• While the aforementioned points indicate that the Facebook-owned
instant messaging app is taking serious measures to sustain security
requisites of users, there is a serious loophole that needs to be addressed
to make it full proof.
• Sure the new measure will prevent cyber-crimes, hacking, and misuse of
data, but at the same time it will become a safe haven for terrorists and
criminals to communicate, which is a huge setback.
• In Apple’s case, the main issue raised was related to iPhone users, which is
a fraction of WhatsApp users in the world. However, encrypting the
messaging platform opens the door for a large number of criminals and
terrorists to communicate safely without coming under the radar.
• While encrypting messages is a great step by WhatsApp, they should also
figure out a way to accumulate as much user data as possible at the time
of signing up/installing WhatsApp.
Contd..
• Currently, the process of joining the messaging is so simple that even a 10-
year-old can set it up in less than five minutes. With augmented focus on
safekeeping data, the company should at least try to come up with a
restricted sign-up process to avoid malicious users.
• To sum it up, the new end-to-end encryption protocol is definitely
something that will protect you from the cyber-attacks, hackers, and
government monitoring.
• However, the WhatsApp crew should also look for ways to tauten the
initial installation/ signup procedure to avoid unwanted users, and have
some record about each of its user in case of an emergency.
Facebook Integration
What is Facebook Integration of
Whatsapp
• At the time Facebook bought WhatsApp in 2014 for nearly $ 19 billion, co-
founder Jan Koum insisted WhatsApp would remain true to its mission,
which was to respect user privacy, and not collect user data.
• Explanation given by Facebook
“We don’t know your birthday. We don’t know your home address. We
don’t know where you work. We don’t know your likes, what you search for
on the Internet or collect your GPS location. None of that data has ever been
collected and stored by WhatsApp, and we really have no plans to change
that… It has the effect of scaring people into thinking we’re suddenly
collecting all kinds of new data… our future partnership with Facebook will
not compromise the vision that brought us to this point,” Koum wrote.
What is Account info Sharing?
• This information includes the device used, online status, usage and log
information.
• The reasoning: To help improve ad experiences, to more accurately count
unique users and fight spam and abuse. Exactly how Facebook ads will
improve with WhatsApp information is left unclear, but there is more.
• WhatsApp is also getting ready to welcome services such as banks, airlines
on the app, an idea that has been discussed earlier as well. WhatsApp’s
latest blog says this: These services are coming soon, and they will start
testing it on the app. For WhatsApp, which has never actually made any
money, and is still not serving ads, this is one way of generating revenue.
• And yes it could make the app even more potent in its fight against SMS
and other players, especially an app like Telegram. WhatsApp plans to be
even more indispensable to the user by integrating services, rather than
an app where people keep sharing ‘good morning messages’.
Can a user opt out from this?
Technically yes. Users have 30 days after they accept the new terms of service
to not allow Facebook sharing. There is an option in the Account tab of
WhatsApp Settings to uncheck Sharing Info with Facebook. Once you choose
not to share information with Facebook, you won’t be able to change this
setting in the future. Interestingly, WhatsApp says, “Your chats and phone
number will not be shared on to Facebook regardless of this setting.” “On to”
is the operative part here — it means that your number won’t be added on to
Facebook, but information sharing will happen nonetheless.
So what really happens
• The new privacy policy says, “We will allow you and third parties, like
businesses, to communicate with each other using WhatsApp, such as
through order, transaction, and appointment information, delivery and
shipping notifications, product and service updates, and marketing. For
example, you may receive flight status information for upcoming travel, a
receipt for something you purchased, or a notification when a delivery will
be made. Messages you may receive containing marketing could include
an offer for something that might interest you.”
• The last bit is interesting because WhatsApp says it won’t be serving ads
to users, but don’t be surprised if marketing offers turn up from these
services on the app. For WhatsApp, services are a way of generating
revenue without resorting to outright ads. The world’s biggest message
app wants to be indispensable to users by integrating services.
Contd…
• For the first time, WhatsApp is also looking at copyrighted content, and
now wants to help people, organizations “protect their intellectual
property rights”. It is not clear how this will apply to, say, video clips or
songs people might share on the app, because the app is technically end-
to-end encrypted, and says it doesn’t read a user’s messages.
• But infringement could also include profile pictures, profile name, etc., so
it might help in cases where people’s profile photos are stolen to create
another WhatsApp account.
Review on Whatsapp's End to End encryption and Facebook integration

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Securitycclark_isec
 
Introduction to Dynamic Analysis of Android Application
Introduction to Dynamic Analysis of Android ApplicationIntroduction to Dynamic Analysis of Android Application
Introduction to Dynamic Analysis of Android ApplicationKelwin Yang
 
Whatsapp-An innovative way of networking
Whatsapp-An innovative way of networkingWhatsapp-An innovative way of networking
Whatsapp-An innovative way of networkingSamrat Sikri
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)securityEnrico Zimuel
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computinggaurav jain
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Mobile Applications
Mobile ApplicationsMobile Applications
Mobile ApplicationsShweta Jain
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server SecurityJITENDRA KUMAR PATEL
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 

Was ist angesagt? (20)

Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Mobile security
Mobile security Mobile security
Mobile security
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Introduction to Dynamic Analysis of Android Application
Introduction to Dynamic Analysis of Android ApplicationIntroduction to Dynamic Analysis of Android Application
Introduction to Dynamic Analysis of Android Application
 
Whatsapp-An innovative way of networking
Whatsapp-An innovative way of networkingWhatsapp-An innovative way of networking
Whatsapp-An innovative way of networking
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
LAN Security
LAN Security LAN Security
LAN Security
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Java tutorial PPT
Java tutorial PPTJava tutorial PPT
Java tutorial PPT
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Mobile Applications
Mobile ApplicationsMobile Applications
Mobile Applications
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 

Andere mochten auch

WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryptionVenkatesh Kariappa
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemSyuan Wang
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explainedTodd Merrill
 
End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsJeff Lambert
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...Alex Tan
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 

Andere mochten auch (7)

WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed Applications
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 

Ähnlich wie Review on Whatsapp's End to End encryption and Facebook integration

Whattsup new feature 2022
Whattsup new feature 2022Whattsup new feature 2022
Whattsup new feature 2022Google
 
How can i use whats app for business
How can i use whats app for businessHow can i use whats app for business
How can i use whats app for businessNotifyVisitors
 
AMAZING PROS OF USING WHATSAPP FOR BUSINESS
AMAZING PROS OF USING WHATSAPP FOR BUSINESSAMAZING PROS OF USING WHATSAPP FOR BUSINESS
AMAZING PROS OF USING WHATSAPP FOR BUSINESSe-Definers Technology
 
An Extensive Guide on Making a Modern-day Messaging App in 2021!
An Extensive Guide on Making a Modern-day Messaging App in 2021!An Extensive Guide on Making a Modern-day Messaging App in 2021!
An Extensive Guide on Making a Modern-day Messaging App in 2021!Shelly Megan
 
How much does it cost to develop whatsapp app
How much does it cost to develop whatsapp appHow much does it cost to develop whatsapp app
How much does it cost to develop whatsapp appFuGenx Technologies
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 
WhatsApp sales magnet
WhatsApp sales magnetWhatsApp sales magnet
WhatsApp sales magnetPeterOffeh
 
Whataspp Pay New Feature Implementation
Whataspp Pay  New Feature ImplementationWhataspp Pay  New Feature Implementation
Whataspp Pay New Feature ImplementationMohith Pulavarthi
 
WhatsApp Business API
WhatsApp Business APIWhatsApp Business API
WhatsApp Business APIamisamalia
 
Must have features to include in a real-time messaging app like whats app, vi...
Must have features to include in a real-time messaging app like whats app, vi...Must have features to include in a real-time messaging app like whats app, vi...
Must have features to include in a real-time messaging app like whats app, vi...Appdupe
 
Whatsapp in marketing
Whatsapp in marketing Whatsapp in marketing
Whatsapp in marketing umamahes2994
 
Interpod powerpoint (1)
Interpod powerpoint (1)Interpod powerpoint (1)
Interpod powerpoint (1)evatee
 
Increase sales with e commerce chat on your commercial website
Increase sales with e commerce chat on your commercial websiteIncrease sales with e commerce chat on your commercial website
Increase sales with e commerce chat on your commercial websiteAndolasoft Inc
 
Exploring External Solutions: Enhancing Communication with WeChat and WhatsAp...
Exploring External Solutions: Enhancing Communication with WeChat and WhatsAp...Exploring External Solutions: Enhancing Communication with WeChat and WhatsAp...
Exploring External Solutions: Enhancing Communication with WeChat and WhatsAp...gracetcabrera21
 
Social Impact of Technology - Final Presentation
Social Impact of Technology - Final PresentationSocial Impact of Technology - Final Presentation
Social Impact of Technology - Final Presentationandyjhayes
 

Ähnlich wie Review on Whatsapp's End to End encryption and Facebook integration (20)

Whats app
Whats appWhats app
Whats app
 
Whattsup new feature 2022
Whattsup new feature 2022Whattsup new feature 2022
Whattsup new feature 2022
 
How can i use whats app for business
How can i use whats app for businessHow can i use whats app for business
How can i use whats app for business
 
Business WhatsApp by Mcarbon
Business WhatsApp by McarbonBusiness WhatsApp by Mcarbon
Business WhatsApp by Mcarbon
 
AMAZING PROS OF USING WHATSAPP FOR BUSINESS
AMAZING PROS OF USING WHATSAPP FOR BUSINESSAMAZING PROS OF USING WHATSAPP FOR BUSINESS
AMAZING PROS OF USING WHATSAPP FOR BUSINESS
 
An Extensive Guide on Making a Modern-day Messaging App in 2021!
An Extensive Guide on Making a Modern-day Messaging App in 2021!An Extensive Guide on Making a Modern-day Messaging App in 2021!
An Extensive Guide on Making a Modern-day Messaging App in 2021!
 
How much does it cost to develop whatsapp app
How much does it cost to develop whatsapp appHow much does it cost to develop whatsapp app
How much does it cost to develop whatsapp app
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
WhatsApp sales magnet
WhatsApp sales magnetWhatsApp sales magnet
WhatsApp sales magnet
 
WeChat
WeChatWeChat
WeChat
 
Whataspp Pay New Feature Implementation
Whataspp Pay  New Feature ImplementationWhataspp Pay  New Feature Implementation
Whataspp Pay New Feature Implementation
 
WhatsApp Business API
WhatsApp Business APIWhatsApp Business API
WhatsApp Business API
 
Must have features to include in a real-time messaging app like whats app, vi...
Must have features to include in a real-time messaging app like whats app, vi...Must have features to include in a real-time messaging app like whats app, vi...
Must have features to include in a real-time messaging app like whats app, vi...
 
Whatsapp in marketing
Whatsapp in marketing Whatsapp in marketing
Whatsapp in marketing
 
WhatsApp API.pdf
WhatsApp API.pdfWhatsApp API.pdf
WhatsApp API.pdf
 
Interpod powerpoint (1)
Interpod powerpoint (1)Interpod powerpoint (1)
Interpod powerpoint (1)
 
Strategy on whatsapp
Strategy on whatsappStrategy on whatsapp
Strategy on whatsapp
 
Increase sales with e commerce chat on your commercial website
Increase sales with e commerce chat on your commercial websiteIncrease sales with e commerce chat on your commercial website
Increase sales with e commerce chat on your commercial website
 
Exploring External Solutions: Enhancing Communication with WeChat and WhatsAp...
Exploring External Solutions: Enhancing Communication with WeChat and WhatsAp...Exploring External Solutions: Enhancing Communication with WeChat and WhatsAp...
Exploring External Solutions: Enhancing Communication with WeChat and WhatsAp...
 
Social Impact of Technology - Final Presentation
Social Impact of Technology - Final PresentationSocial Impact of Technology - Final Presentation
Social Impact of Technology - Final Presentation
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Review on Whatsapp's End to End encryption and Facebook integration

  • 1. LATEST UPDATES – A Review • End To End Encryption • Facebook Integration By: Govindarrajan NV BIM,Trichy
  • 2. END TO END ENCRYPTION
  • 3. What is END To END Encryption? • WhatsApp's end-to-end encryption is available when you and the people you message use the latest versions of the app. • WhatsApp's end-to-end encryption ensures only you and the person you're communicating with can read what is sent, and nobody in between, not even WhatsApp. • This is because your messages are secured with a lock, and only the recipient and you have the special key needed to unlock and read them. For added protection, every message you send has its own unique lock and key. • All of this happens automatically: no need to turn on settings or set up special secret chats to secure your messages.
  • 5. End To End Encryption - Advantages • The new end-to-end encryption feature is based on the Signal Protocol, designed by Open Whisper Systems. • According to the technical White Paper on WhatsApp encryption, the end- to-end encryption protocol has been designed to prevent third parties and WhatsApp from having plaintext access to messages or calls. • From now on, when you send any message to a group or an individual, the data will only be visible to you and the group/individual you sent it to—no one else can peep inside that message. • A blog said: “No one can see inside that message. Not cyber criminals. Not hackers. Not oppressive regimes. Not even Whatsapp. End-to-end encryption helps to make communication via WhatsApp private – sort of like a face-to-face conversation.” • Now this is an amazing initiative, considering the exponential increase of hackers in the recent past. With more people using smartphones and instant messaging platforms for business, the new feature will certainly assist users in keeping data protected from cyber criminals.
  • 6. Contd.. • In fact, more businesses and organizations are excessively employing mobile-based messaging platforms for discussing company policies, plans, and other confidential details. In such a scenario, this feature will definitely help in safeguarding data better. • With the new end-to-end encryption feature, WhatsApp will not only protect text messages, but will also secure photos, videos, voice messages, documents, and even calls. • Now individual users will be able to share data without any hiccups. As mentioned earlier, WhatsApp claims that even they cannot access the message. • According to another blog, with the new update, all your messages on WhatsApp will be secured with a lock and “only the recipient and you have the special key” to unlock and access them. • “For added protection, every message you send has its own unique lock and key. All of this happens automatically: no need to turn on settings or set up special secret chats to secure your messages,” the blog added.
  • 7. End To End Encryption - Disadvantages • While the aforementioned points indicate that the Facebook-owned instant messaging app is taking serious measures to sustain security requisites of users, there is a serious loophole that needs to be addressed to make it full proof. • Sure the new measure will prevent cyber-crimes, hacking, and misuse of data, but at the same time it will become a safe haven for terrorists and criminals to communicate, which is a huge setback. • In Apple’s case, the main issue raised was related to iPhone users, which is a fraction of WhatsApp users in the world. However, encrypting the messaging platform opens the door for a large number of criminals and terrorists to communicate safely without coming under the radar. • While encrypting messages is a great step by WhatsApp, they should also figure out a way to accumulate as much user data as possible at the time of signing up/installing WhatsApp.
  • 8. Contd.. • Currently, the process of joining the messaging is so simple that even a 10- year-old can set it up in less than five minutes. With augmented focus on safekeeping data, the company should at least try to come up with a restricted sign-up process to avoid malicious users. • To sum it up, the new end-to-end encryption protocol is definitely something that will protect you from the cyber-attacks, hackers, and government monitoring. • However, the WhatsApp crew should also look for ways to tauten the initial installation/ signup procedure to avoid unwanted users, and have some record about each of its user in case of an emergency.
  • 10. What is Facebook Integration of Whatsapp • At the time Facebook bought WhatsApp in 2014 for nearly $ 19 billion, co- founder Jan Koum insisted WhatsApp would remain true to its mission, which was to respect user privacy, and not collect user data. • Explanation given by Facebook “We don’t know your birthday. We don’t know your home address. We don’t know where you work. We don’t know your likes, what you search for on the Internet or collect your GPS location. None of that data has ever been collected and stored by WhatsApp, and we really have no plans to change that… It has the effect of scaring people into thinking we’re suddenly collecting all kinds of new data… our future partnership with Facebook will not compromise the vision that brought us to this point,” Koum wrote.
  • 11. What is Account info Sharing? • This information includes the device used, online status, usage and log information. • The reasoning: To help improve ad experiences, to more accurately count unique users and fight spam and abuse. Exactly how Facebook ads will improve with WhatsApp information is left unclear, but there is more. • WhatsApp is also getting ready to welcome services such as banks, airlines on the app, an idea that has been discussed earlier as well. WhatsApp’s latest blog says this: These services are coming soon, and they will start testing it on the app. For WhatsApp, which has never actually made any money, and is still not serving ads, this is one way of generating revenue. • And yes it could make the app even more potent in its fight against SMS and other players, especially an app like Telegram. WhatsApp plans to be even more indispensable to the user by integrating services, rather than an app where people keep sharing ‘good morning messages’.
  • 12. Can a user opt out from this? Technically yes. Users have 30 days after they accept the new terms of service to not allow Facebook sharing. There is an option in the Account tab of WhatsApp Settings to uncheck Sharing Info with Facebook. Once you choose not to share information with Facebook, you won’t be able to change this setting in the future. Interestingly, WhatsApp says, “Your chats and phone number will not be shared on to Facebook regardless of this setting.” “On to” is the operative part here — it means that your number won’t be added on to Facebook, but information sharing will happen nonetheless.
  • 13. So what really happens • The new privacy policy says, “We will allow you and third parties, like businesses, to communicate with each other using WhatsApp, such as through order, transaction, and appointment information, delivery and shipping notifications, product and service updates, and marketing. For example, you may receive flight status information for upcoming travel, a receipt for something you purchased, or a notification when a delivery will be made. Messages you may receive containing marketing could include an offer for something that might interest you.” • The last bit is interesting because WhatsApp says it won’t be serving ads to users, but don’t be surprised if marketing offers turn up from these services on the app. For WhatsApp, services are a way of generating revenue without resorting to outright ads. The world’s biggest message app wants to be indispensable to users by integrating services.
  • 14. Contd… • For the first time, WhatsApp is also looking at copyrighted content, and now wants to help people, organizations “protect their intellectual property rights”. It is not clear how this will apply to, say, video clips or songs people might share on the app, because the app is technically end- to-end encrypted, and says it doesn’t read a user’s messages. • But infringement could also include profile pictures, profile name, etc., so it might help in cases where people’s profile photos are stolen to create another WhatsApp account.