Thursday, December 10, 2015

WhatsApp adds End to End Encryption: What you need to know

WhatsApp adds End to End Encryption: What you need to know -

end-to-end encryption In early April, right on the heels of the FBI conflict against Apple, the courier instant WhatsApp announced that it has deployed the encryption end to end, joining other popular email applications such as Apple iMessage using this security feature. Although this announcement really affects only 1 billion or so users WhatsApp, it shows that some of the major players in the technology industry are serious about privacy and security. While most of us are familiar with encryption, encryption end to end can be a completely foreign concept. To help you understand the importance of encryption end to end, we have detailed everything you need to know.

What encryption end to end?

End-to-end encryption is the holy grail of cybersecurity because it is a form of communication in which the data is protected throughout the exchange - which means that the sender or the recipient have the means to decrypt the data and see in plain text or it is cybersecurity "as is." the equivalent of wearing a bulletproof vest, your data remains safe, even if you are using unsecured networks, such as an open network or Wi-Fi. The protection from beginning to end also extends to law enforcement snooping, we have all seen with Apple vs the FBI. In case the government asks WhatsApp to hand user data, it would be almost impossible to provide such information (assuming both are fitted with the latest software) because only the devices participating in the exchange may actually see the information (the company itself can not even decode). That said, from end to end encryption is not immune from a backdoor access, something we have also seen if Apple vs FBI.

Are there any downfalls to end at the end of encryption?

Unfortunately, end to end encryption does have limitations, namely users and their devices -. "Ends" in other words, encryption is only good while the data is in transit as devices and more often people themselves may be exploitable. One of the most common forms of exploitation occurs when a user clicks namely a malicious link in an email, which can compromise the security of your device as well as put your identity at risk because it infects often your device with malware that can allow a hacker to see what you do. Check out our guide to avoiding email scams for more. Also, find out if you may be unknowingly expose your identity every day by making simple mistakes.

Note that although safety may be just as perfect as user devices and Cyber ​​Security Awareness allow, WhatsApp developers have against measures created to protect users in case a hack, as its audit control that can be used to reveal frauds that might be phishing. But even with these protections, which are not foolproof methods to stop fraud, there is now greater urgency to that users are cyber security aware as more cybercriminals will likely concentrate their efforts on people and their devices.

Is there anything else I should know?

WhatsApp users want to ensure that their application is up to date. If you are unsure whether your version uses encryption end to end, WhatsApp has a tool to help you check. In addition, all users of smartphones, tablets and computers (regardless if you use WhatsApp) should be aware of these basic cybersecurity tips because they can help you or your device against potential threats to protect.

1. Avoid insecure networks. Although Wi-Fi at your local cafe or library can be practical, these networks are generally not as safe as you would like, which is why it is best to avoid them. Learn more about the dangers reading our guide to public Wi-Fi networks.

2. Use strong passwords. While using the same password for all your online accounts may make them easier to remember, they do nothing to protect your information. Ensure that you use a password for each of your accounts will help you protect your information and data more than you realize. I do not know what makes a password? This blog has ventilation.

3. Do not overshare. Social media and other online communications helps us to connect with family members, friends and colleagues, we can not have seen for years, but they can also expose your identity if you detail all aspects of your life and opt to use features such as geolocation. Follow these tips to avoid oversharing.

4. Protect your device. One of the easiest ways to protect your devices phishing, hacking or malware attacks is to invest in an Internet security software, which will not only alert you to potential threats, but also block and eliminate any threat that made their way onto your device. While some Internet security software companies do not offer the best mobile protection, others have applications that provide very extensive features. Check out our review of the biggest names in internet security software to find the best option to protect all your devices.

5. Save your. Data We appreciate all the data that we store on our computers, smartphones and tablets, we want to ensure that it remains safe if our device is compromised, especially if you fall victim to a ransomware attack . That's where the online backup comes in. These services allow you to configure automatic backups of your important photos or other files from any device you want to use the desktop version of a service or mobile application, which means you will not have to manually download anything and it will all be easily accessible in the cloud if you ever want to download it again. Browse our online backup review for more information.

Although from end to end encryption is designed to protect the data from the time it is sent when it is delivered, it is also designed to complement the good practices in cybersecurity, and not replace them. Follow our blog technology to learn more about cybersecurity and protect yourself online.

WhatsApp adds End to End Encryption: What you need to know Rating: 4.5 Diposkan Oleh: ABC Unique

0 comments:

Post a Comment