WhatsApp announces end-to-end encryption

Al voice messages, text messages, photo and videos sent on the platform are hidden from third parties

WhatsApp has announced all communications sent through its platform are to be fully encrypted, which it claims makes it one of the most secure free messaging platforms around.

The new measures mean when you send a text message, voice message, photo, video or anything else through its platform, only the person or group who is sent the message can read it.

Advertisement - Article continues below

WhatsApp explained that neither cybercriminals nor hackers are able to access the content of the messages, nor can WhatsApp itself, oppressive regimes or governments that may want to snoop on its users, for example.

The company explained that although allowing access to data is an important part of law enforcement, not allowing end-to-end encryption could be dangerous, giving cybercriminals the means to hack into personal data.

"While we recognise the important work of law enforcement in keeping people safe, efforts to weaken encryption risk exposing people's information to abuse from cybercriminals, hackers, and rogue states," WhatsApp said.

"While WhatsApp is among the few communication platforms to build full end-to-end encryption that is on by default for everything you do, we expect that it will ultimately represent the future of personal communication," WhatsApp founder Jan Koum added in a blog post.

Advertisement
Advertisement - Article continues below

"The desire to protect people's private communication is one of the core beliefs we have at WhatsApp, and for me, it's personal. I grew up in the USSR during communist rule and the fact that people couldn't speak freely is one of the reasons my family moved to the United States."

Although some aspects of WhatsApp were previously encrypted after the company's integration with Open Whisper Systems, it is now encrypted across all content - voice calls, video, and multi-party chat rooms - for users on both iOS and Android.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
Visit/laptops/34623/how-to-connect-one-two-or-more-monitors-to-your-laptop-including-usb-type-c
Laptops

How to connect one, two or more monitors to your laptop

29 Jun 2020