End-to-End Encryption Archives - Tech Research Online Knowledge Base for IT Pros Wed, 05 Jul 2023 16:18:56 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.4 https://techresearchonline.com/wp-content/uploads/2019/09/full-black-d_favicon-70-70.png End-to-End Encryption Archives - Tech Research Online 32 32 Facebook Delays its Plans to Get Default End-to-End Encryption to Address Safety Concerns https://techresearchonline.com/news/facebook-delays-its-plans-to-get-default-end-to-end-encryption-to-address-safety-concerns/ https://techresearchonline.com/news/facebook-delays-its-plans-to-get-default-end-to-end-encryption-to-address-safety-concerns/#respond Mon, 22 Nov 2021 14:32:30 +0000 https://techresearchonline.com/?p=89974 Meta, the parent company of Facebook, Instagram, and WhatsApp, is not planning to roll out End-to-End encryption on Messenger and Instagram by default until 2023, first reported by The Guardian.  Last year, the company merged Instagram chats with Messenger as it plans to unify messaging ecosystem across platforms. While messages sent through Messenger and Instagram can be E2EE, that option isn’t turned on by default. WhatsApp already offers and supports E2EE by default. In a post in The Telegraph, Meta’s head of safety, Antigone Davis, attributes the delay to concerns about user safety. Since E2EE allows only the sender and receiver to view conversations, Meta is concerned that this will interfere with its ability to help stop criminal activity.  Davis notes that once available by default, the company will “use a combination of non-encrypted data across our apps, account information and reports from users” to help keep them safe while “assisting public safety efforts.”  Earlier this year, in a blog post, the company said that E2EE by default would be available on Messenger and Instagram “sometime in 2022 at the earliest.” However, now, Davis says that the company is delaying on their plans as they want to “get this right,” the feature’s debut until 2023.  According to the UK’s Online Safety bill, going into effect by 2023, online platforms are required to keep children from harm and address abusive content.   Priti Patel, the UK’s Home Secretary, has criticized E2EE use in the past as this might …

The post Facebook Delays its Plans to Get Default End-to-End Encryption to Address Safety Concerns appeared first on Tech Research Online.

]]>
Meta, the parent company of Facebook, Instagram, and WhatsApp, is not planning to roll out End-to-End encryption on Messenger and Instagram by default until 2023, first reported by The Guardian. 

Last year, the company merged Instagram chats with Messenger as it plans to unify messaging ecosystem across platforms.

While messages sent through Messenger and Instagram can be E2EE, that option isn’t turned on by default. WhatsApp already offers and supports E2EE by default.

In a post in The Telegraph, Meta’s head of safety, Antigone Davis, attributes the delay to concerns about user safety. Since E2EE allows only the sender and receiver to view conversations, Meta is concerned that this will interfere with its ability to help stop criminal activity. 

Davis notes that once available by default, the company will “use a combination of non-encrypted data across our apps, account information and reports from users” to help keep them safe while “assisting public safety efforts.” 

Earlier this year, in a blog post, the company said that E2EE by default would be available on Messenger and Instagram “sometime in 2022 at the earliest.” However, now, Davis says that the company is delaying on their plans as they want to “get this right,” the feature’s debut until 2023. 

According to the UK’s Online Safety bill, going into effect by 2023, online platforms are required to keep children from harm and address abusive content.  

Priti Patel, the UK’s Home Secretary, has criticized E2EE use in the past as this might hinder Facebook’s plans to enable E2EE by default.  

In a report from BBC, Patel states: “Sadly, at a time when we need to be taking more action… Facebook is still pursuing E2EE plans that place the good work and the progress that has already been made at jeopardy.” 

Read Also: Facebook launches Portal Go, New Portal+ to take on Amazon Echo smart devices

 

The post Facebook Delays its Plans to Get Default End-to-End Encryption to Address Safety Concerns appeared first on Tech Research Online.

]]>
https://techresearchonline.com/news/facebook-delays-its-plans-to-get-default-end-to-end-encryption-to-address-safety-concerns/feed/ 0
Zoom To Encrypt End-To-End Encryption Only For Paying Customers FBI Access To Calls https://techresearchonline.com/blog/zoom-to-encrypt-end-to-end-encryption-only-for-paying-customers-fbi-access-to-calls/ https://techresearchonline.com/blog/zoom-to-encrypt-end-to-end-encryption-only-for-paying-customers-fbi-access-to-calls/#respond Tue, 09 Jun 2020 10:22:33 +0000 https://techresearchonline.com/?p=8695 Zoom video calling app has boomed during the time of the pandemic. Zoom making its way on the of Android and iOS app stores as all the social interactions shifts online including office conferences to friends and family get together. Popularity and increased traffic the video calling app is now facing a huge privacy and security backlash. Several security experts, lawmakers, privacy advocates, and the FBI have already warned the app’s default settings aren’t secure. The app has become a victim of its success. The government in the UK held several daily cabinet meetings over the app. These security and privacy concerns are is nothing new as the app has fought similar battles before. Last year, a serious security vulnerability in the app lets attackers hijack websites Mac cameras. This led Apple to take a step in and silently remove Zoom from Macs. The rising scrutiny over the app’s security practices has intensified in the last few weeks. Users can access a Zoom meeting using a randomly generated ID number which is between 9 to 11 digits long. Researchers found that these meeting IDs are easy to guess and even brute forceable. Allowing anyone to access a meeting or eavesdrop into meetings. This gave rise to …

The post Zoom To Encrypt End-To-End Encryption Only For Paying Customers FBI Access To Calls appeared first on Tech Research Online.

]]>
Zoom video calling app has boomed during the time of the pandemic. Zoom making its way on the of Android and iOS app stores as all the social interactions shifts online including office conferences to friends and family get together. Popularity and increased traffic the video calling app is now facing a huge privacy and security backlash.

Several security experts, lawmakers, privacy advocates, and the FBI have already warned the app’s default settings aren’t secure. The app has become a victim of its success. The government in the UK held several daily cabinet meetings over the app.

These security and privacy concerns are is nothing new as the app has fought similar battles before. Last year, a serious security vulnerability in the app lets attackers hijack websites Mac cameras. This led Apple to take a step in and silently remove Zoom from Macs. The rising scrutiny over the app’s security practices has intensified in the last few weeks.

Users can access a Zoom meeting using a randomly generated ID number which is between 9 to 11 digits long. Researchers found that these meeting IDs are easy to guess and even brute forceable. Allowing anyone to access a meeting or eavesdrop into meetings.

This gave rise to a new phenomenon called “Zoombombing” where pranksters join Zoom calls only to broadcast porn or shock videos. Zoom’s default settings allow participants to share their screen without encouraging a password for meetings.

On 16th April, Motherboard learned that the software vulnerability brokers are looking to sell two zero-day Zoom exploits. One is affecting clients of Windows and the other is impacting that of OS X. Zoom adjusted these default settings for education accounts to increase security and privacy for meetings. Others had to change some of their settings.

After users discovered that their personal information was susceptible, Zoom then had to rewrite parts of its privacy policy. Later, Zoom stated on its website that users can secure a meeting with end-to-end encryption. However, the company was then forced to admit that the post was misleading people.

A spokesperson of Zoom said in a statement to The Intercept it is not possible to enable E2E encryption for the app’s video meetings.

Last week, Zoom Video Communications, an American tech company with its headquartered in San Jose, California confirmed that they will not enable end-to-end encryption for free calls. As the company wants to give law enforcement access to these calls if necessary.

On 2nd June, Eric Yuan, CEO of Zoom said in a meeting with investors said that the feature should be a part of the offering only for professional customers. According to the company “Free users for sure we don’t want to give [them] that, because we also want to work together with the FBI, with local law enforcement, in case some people use Zoom for a bad purpose.”

Encryption is a key issue for Zoom, which has been attempting to beef up its privacy and security after heavy usage exposed weak points during the COVID-19 pandemic. Last week, Reuters reported that the company will be rolling out end-to-end high-security encryption only for paying customers.

There are rising conversations around protecting privacy while simultaneously making it easy to catch illegal and abusive content. Congress is now considering a bill that could legally punish social media platforms using encryption. As it is hard for normal polices to find content that has strong encryption. However, it can be very valuable for people who are discussing sensitive information and are at a heightened risk of intrusion as it offers additional protection.

Read Tech News: Zoom Rolls-out End-to-End Encryption for Its Paid and Free Users

Yuan has further emphasized that since people can’t dial into an encrypted call, phone encryption will require practical trade-offs. This makes it likely that not many customers will use it. His comments emphasized the priorities of the Zoom app to keep law enforcement in the loop.

To elaborate more on the company’s policy, the spokesperson said in a statement, “Zoom does not proactively monitor meeting content, and we do not share information with law enforcement except in circumstances like child sex abuse. We do not have backdoors where participants can enter meetings without being visible to others. None of this will change.”

He further added that “Zoom’s end-to-end encryption plan balances the privacy of its users with the safety of vulnerable groups, including children and potential victims of hate crimes. We plan to provide end-to-end encryption to users for whom we can verify identity, thereby limiting harm to these vulnerable groups. Free users sign up with an email address, which does not provide enough information to verify identity.”

The post Zoom To Encrypt End-To-End Encryption Only For Paying Customers FBI Access To Calls appeared first on Tech Research Online.

]]>
https://techresearchonline.com/blog/zoom-to-encrypt-end-to-end-encryption-only-for-paying-customers-fbi-access-to-calls/feed/ 0