Live
- Over 7,600 Syrians return from Turkiye in five days after Assad's downfall: minister
- Delhi BJP leaders stay overnight in 1,194 slum clusters
- Keerthy Suresh and Anthony Thattil Tie the Knot in a Christian Ceremony
- AAP, BJP making false promises to slum dwellers for votes: Delhi Congress
- 'Vere Level Office' Review: A Refreshing Take on Corporate Life with Humor and Heart
- Libya's oil company declares force majeure at key refinery following clashes
- Illegal Rohingyas: BJP seeks Assembly session to implement NRC in Delhi
- Philippines orders full evacuation amid possible volcanic re-eruption
- Government Prioritizes Welfare of the Poor, says Dola Sri Bala Veeranjaneyaswamy
- Two Russian oil tankers with 29 on board damaged due to bad weather
Just In
WhatsApp (which actually sounds like \"What\'s up\") Messenger is eight years old and is considered as one of the most successful mobile telephone (Smartphone) based freeware platform used for instant messaging. This application (app) was developed by two former employees of Yahoo who were actually once rejected by Facebook.
WhatsApp (which actually sounds like "What's up") Messenger is eight years old and is considered as one of the most successful mobile telephone (Smartphone) based freeware platform used for instant messaging. This application (app) was developed by two former employees of Yahoo who were actually once rejected by Facebook.
This most popular global messaging app is known to have approximately 1.2 billion users. Presently, this application is most sought after because of its data transfer capability in audio, video, and image sharing sectors. Also, mobile telephony is an additional advantage.
The strength of this application is obvious and evident from the vast number of users…Hackers too use WhatsApp as a platform for distributing malware. Some authentic looking word files get circulated via WhatsApp and, upon being downloaded, sensitive information with regard to bank accounts get transmitted back from the attacked smartphone…
Globally, intelligence agencies are concerned that terrorist organisations could be making effective use of WhatsApp. Some reports indicate that terror groups such as ISIS, which has already demonstrated its ability to effectively use social media, could also be using WhatsApp for its nefarious activities.
On March 22, 2017, a terrorist attack took place in the vicinity of the British Parliament, with the attacker intentionally driving a car into pedestrians and injuring more than 50 people, three of whom as well as a police officer became fatalities. UK government agencies are of the opinion that the attacker could have used WhatsApp just minutes before carrying out the attack.
In order to know more about the exact nature of communication that happened just before the attack, the UK government has asked WhatsApp to provide its security services with access to encrypted messages. But this has not been palatable to the WhatsApp administration.
This is not the first time that such denial of access to intelligence services and police has happened. Over the years, various major private organisations handling messaging and communications services have denied such access to government agencies for carrying out lawful eavesdropping because of business, security and technical reasons.
They contend that providing such access would infringe upon human rights. Also, it would require a weakening of their overall levels of encryption, thus making these services even more vulnerable. Internet messages are sent through End-to-End Encryption (E2EE), and private organisations are not keen to break this format.
E2EE allows only the communicating users to read the messages and prevents potential eavesdroppers. In short, these organisations have developed their architecture in such a way as to ensure that any attempt at surveillance does not succeed. But states are keen to do exactly that…
However, there is a need to appreciate the duties and responsibilities of the state in relation to the members of its own society, and the laws and regulations that should be established accordingly while respecting human rights. End-to-end encryption can have the result that no content data is available to hand over in reply to a lawful government request.
However, cryptographic approaches could help to limit exposure of user data and communications and reduce the intricacies of dealing with government access requests. Ethical hacking is all about attempting to bypass system security and search for weak points that could be exploited by nasty hackers…States need to develop their capabilities in the arena of ethical hacking.
Today, not much of a debate happens on the need for developing offensive cyber-attack capabilities. But it is expected that some states would be preparing in that regard without advertising it. Perhaps, the time has come to demonstrate such capabilities openly. This could serve a twin purpose: convey capabilities to adversaries and also a message to the private industry.
No private industry would be keen to get its clients informed about the vulnerabilities in their system. This eventually could even make them cooperate with the state. The United States used the Apple case to do this. Would the UK do so in the case of WhatsApp? (Courtesy: IDSA; Excerpts from the article at http://www.idsa.in/idsacomments/whats-down-side-of-whats-up_alele070417)
By Ajey Lele
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com