WhatsApp End-to-End Encryption Makes It Impossible to View Users’ Communication
Would you share this Article with others?
Messages, documents or media files sent by WhatsApp users encrypted by end-to-end encryption, will only be able to be read or viewed by the intended recipients only (not even by WhatsApp), and once messages, documents and media files are delivered to the recipients, WhatsApp will remove them from their servers. But, even if WhatsApp was storing messages, documents or media files on their servers, they wouldn't be able to decrypt the messages, documents or media files themselves, even if they are compelled by law enforcement.
This security update by WhatsApp, will make it impossible for law enforcement (the government) to subpoena WhatsApp users’ messages, documents and media files. Therefore, if the government wants WhatsApp users’ information, they will have to get it directly from the users’ mobile devices. Also, WhatsApp users will not have to worry about WhatsApp’s servers being hacked by cybercriminals, because there will be no information for the cybercriminals to steal, or even if they are able steal any information, they would not be able to decrypt, read or view it, so it would be just useless to them.
WhatsApp encryption works by securing messages, documents or media files with a lock, which only the recipients and senders have special keys needed to unlock, read or view them. Every message sent will have its own unique lock and private key, and at no time will WhatsApp server have access to any of the WhatsApp users' private keys.
WhatsApp says that encryption is one of the most important tools governments, companies, and individuals have to promote safety and security in the new digital age, and they are aware of discussion about encrypted services and the work of law enforcement (the battle between Apple and the U.S government about a terrorist’s IPhone that the F.B.I wants access to, but Apple won’t help). But, WhatsApp says while they recognize the important work of law enforcement in keeping people safe, efforts to weaken encryption risk exposing people's information to abuse by cybercriminals, hackers, and rogue states.
Note: Some of the names, addresses, email addresses, telephone numbers or other information in samples on this website may have been impersonated or spoofed.
Please share what you know or ask a question about this article by leaving a comment below. Check the comment section below for additional information, if there is any. Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: firstname.lastname@example.org. And, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent. Also, to quickly find answers to your questions, use our search engine.
You can help maintain Online Threat Alerts (OTA) by paying a service fee. Click here to make payment.
Comments, Questions, Answers, or Reviews
To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews.
Write Your Comment, Question, Answer, or Review
Write your comment, question, answer, or review in the box below to share what you know or to get answers. NB: We will use your IP address to display your approximate location to other users.