WhatsApp announces end-to-end encryption
Al voice messages, text messages, photo and videos sent on the platform are hidden from third parties
WhatsApp has announced all communications sent through its platform are to be fully encrypted, which it claims makes it one of the most secure free messaging platforms around.
The new measures mean when you send a text message, voice message, photo, video or anything else through its platform, only the person or group who is sent the message can read it.
WhatsApp explained that neither cybercriminals nor hackers are able to access the content of the messages, nor can WhatsApp itself, oppressive regimes or governments that may want to snoop on its users, for example.
The company explained that although allowing access to data is an important part of law enforcement, not allowing end-to-end encryption could be dangerous, giving cybercriminals the means to hack into personal data.
"While we recognise the important work of law enforcement in keeping people safe, efforts to weaken encryption risk exposing people's information to abuse from cybercriminals, hackers, and rogue states," WhatsApp said.
"While WhatsApp is among the few communication platforms to build full end-to-end encryption that is on by default for everything you do, we expect that it will ultimately represent the future of personal communication," WhatsApp founder Jan Koum added in a blog post.
"The desire to protect people's private communication is one of the core beliefs we have at WhatsApp, and for me, it's personal. I grew up in the USSR during communist rule and the fact that people couldn't speak freely is one of the reasons my family moved to the United States."
Although some aspects of WhatsApp were previously encrypted after the company's integration with Open Whisper Systems, it is now encrypted across all content - voice calls, video, and multi-party chat rooms - for users on both iOS and Android.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now