With Secret Conversations in Messenger, Facebook offers support for end-to-end encryption, giving you peace of mind knowing that any sensitive messages with friends and family cannot be deciphered by a third-party. These encrypted chats rely on a device key that ensures only you and the recipient can see the message.
You can verify the device key to confirm that the messages are end-to-end encrypted, set a timer to have secret messages disappear from the conversation and so forth.
In this article, we will show you how to set up and use Secret Conversations in Facebook Messenger.
Apple's unexpected decision to leave certain parts of the iOS 10 kernel unencrypted didn't sit well with some privacy advocates over fears that the move could aid nefarious users to look for security weaknesses in the iOS software. But as it turns out, we now know that an unencrypted kernel allows iOS 10 to run faster: Ivan Krstić, Apple's head of Security Engineering and Architecture, explained at the Black Hat security conference that the unencrypted iOS 10 kernel has absolutely no impact on platform security nor does it decrease security of encrypted user data.
According to a post published yesterday on the official YouTube Engineering and Developers Blog, 97 percent of YouTube's traffic is now encrypted since the Internet giant began rolling out encryption using HTTPS two years ago. Encrypted traffic increases your security by garbling the data as it travels from servers to your computer, and vice versa, in order to make these transmissions unreadable to rogue parties without an encryption key.
The Guardian reported more than a month ago that Facebook would be rolling out end-to-end encryption for chats in Messenger. Friday, the social networking firm announced that it's begun testing the new feature, dubbed Secret Conversations.
An opt-in feature, the new option within the mobile Messenger app for iOS and Android was designed to better support conversations about sensitive topics with end-to-end encryption.
As you know, security experts were baffled realizing that the iOS 10 kernel in beta 1 was not encrypted. Apple argued it was no big deal because the kernel contained no user data so the company had left it unencrypted intentionally in order to increase general system performance, in their own words.
But Apple didn't stop there.
As first discovered by prominent jailbreak developer and iPhone hacker, MuscleNerd, iOS 10 beta 2 actually leaves more parts of the operating system unencrypted.
What's going on here?
Following the discovery by MIT Technology Review that the kernel in iOS 10 beta is unencrypted, Apple has gone on the record to explain why that's the case. Speaking with Dave Mark of The Loop, an Apple spokesperson has officially confirmed that the decision was intentional.
Now, some security experts speculated that leaving the iOS 10 kernel unencrypted would aid anyone, nefarious users included, looking for security weaknesses in the iOS software.
Apple explains why such fears are unfounded.
MIT Technology Review has discovered that the kernel in iOS 10 beta is unencrypted, making it a lot easier for technology-minded users, jailbreak developers and the like to take a peek under iOS's hood and pinpoint any potential vulnerabilities.
For those wondering, kernels in all prior iOS betas used to be encrypted. Is this a bold move meant to help strengthen security in iOS 10 or will this decision actually introduce further security risks and open new attack vectors for hackers to exploit?
After WhatsApp and Viber both introduced end-to-end encryption last month, Facebook Messenger will become the next major messaging app to roll out this essential security feature, reports The Guardian.
Although end-to-end encryption on Messenger will be framed as an optional feature that users will need to manually enable, it will ensure that the contents of communications are hidden from eavesdroppers and that the identities of the participants are concealed.
Apple this month brought back software engineer and top expert in practical cryptography Jon Callas, reports Reuters. The move follows Apple's high-profile battle with the FBI, and amidst a growing war between governments and tech firms over encryption.
Callas worked at Apple in the '90s, and again between 2009 and 2011, when he designed encryption to protect data stored on Mac computers. He rejoined the company in May, to help add more powerful security features to its wide range of consumer products.
FBI Director James Comey said on Thursday that the agency paid more to break into the San Bernardino shooter's iPhone than he'll make in the remaining 7+ years of his tenure. Reuters crunched the numbers, and that suggests that the FBI paid more than $1.3 million for the hack.
That seems like a lot of money for a tool that doesn't work on the iPhone 5s or newer, but speaking at the Aspen Security Forum in London today, the Director said that he believes it was worth it. And of course the FBI will be able to use the tool in other case involving older iPhones.
Apple declined to provide Chinese officials with access to iOS source code, General counsel Bruce Sewell said on Tuesday at a subcommittee hearing on encryption. "We have been asked by the Chinese government. We refused."
Sewell said the request had come in the last two years, and noted several times that Apple has not cooperated with China on that level. Some lawmakers have questioned whether or not Apple has given the country special treatment.
Two weeks after rival WhatsApp announced that chats on its platform are protected from eavesdropping with end-to-end encryption, the popular messaging app Viber on Tuesday released a privacy-enhanced edition of its iPhone and iPad app.
Bumped to version 6.0, messages you send and receive through Viber are now protected with end-to-end encryption, as indicated by the new padlock icon, and you can also hide away specific chats.