Encryption

Viber rolls out self destructing Secret Chats

Messaging service Viber today rolled out a new Secret Chats feature. Not to be confused with Secret Messages, a similar feature introduced in February 2017 that lets you define how long your photos, videos and texts are available after the recipient has opened them, Secret Chats use Viber’s end-to-end encryption let you set a timer on individual messages so they disappear after a few seconds, get an alert when a screenshot is taken and be sure no messages get forwarded.

WhatsApp has a backdoor that allows snooping on end-to-end encrypted messages [updated]

In 2016, WhatsApp finally enabled complete end-to-end encryption for both chats and video calls to ensure that no one but the intended recipient can decipher contents of their communications. Unfortunately, it’s come to light that WhatsApp’s system has been plagued by a major vulnerability which was discovered by Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley.

In an interview with the British newspaper The Guardian, Boelter said the backdoor could let Facebook read end-to-end encrypted content, meaning the social network could be complied with court orders to make decrypted messages available to law enforcement and other government agencies

UPDATE: We’ve received a response from WhatsApp regarding the alleged backdoor.

Here’s everything Cellebrite’s forensic tool can extract from iPhones

Documents uncovered by ZDNet have revealed the true scope of technology from Israeli developer Cellebrite Mobile Synchronization, which specializes in smartphone data extraction, transfer and analysis.

The leaked documents show just how much private data its smartphone forensic tool UFED, used by law enforcement, is capable of extracting from iPhones.

In a single data-extraction session, investigators were able to collect a huge array of personal data from an iPhone 5 like messages, phone calls, voicemails, images and more, including some deleted content. UFED can pull similar data from other phones, too, including Wi-Fi hotspots and cellular towers the device’s was connected to.