Messages, documents or media files sent by WhatsApp users encrypted by end-to-end encryption, will only be able to be read or viewed by the intended recipients only (not even by WhatsApp), and once messages, documents and media files are delivered to the recipients, WhatsApp will remove them from their servers. But, even if WhatsApp was storing messages, documents or media files on their servers, they wouldn't be able to decrypt the messages, documents or media files themselves, even if they are compelled by law enforcement.
This security update by WhatsApp, will make it impossible for law enforcement (the government) to subpoena WhatsApp users’ messages, documents and media files. Therefore, if the government wants WhatsApp users’ information, they will have to get it directly from the users’ mobile devices. Also, WhatsApp users will not have to worry about WhatsApp’s servers being hacked by cybercriminals, because there will be no information for the cybercriminals to steal, or even if they are able steal any information, they would not be able to decrypt, read or view it, so it would be just useless to them.
WhatsApp encryption works by securing messages, documents or media files with a lock, which only the recipients and senders have special keys needed to unlock, read or view them. Every message sent will have its own unique lock and private key, and at no time will WhatsApp server have access to any of the WhatsApp users' private keys.
WhatsApp says that encryption is one of the most important tools governments, companies, and individuals have to promote safety and security in the new digital age, and they are aware of discussion about encrypted services and the work of law enforcement (the battle between Apple and the U.S government about a terrorist’s IPhone that the F.B.I wants access to, but Apple won’t help). But, WhatsApp says while they recognize the important work of law enforcement in keeping people safe, efforts to weaken encryption risk exposing people's information to abuse by cybercriminals, hackers, and rogue states.
Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews. NB: We will use your IP address to display your approximate location to other users. That location is not enough to find you.
Your comment, answer, or review will be set as anonymous because you are not signed in. An anonymous comment, answer, or review cannot be edited or deleted, therefore, review it carefully before posting. Sign-in.
Write Your Comment, Question, Answer, or Review
Recommendation / Advertisement