跳至主要内容

End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger

Since Smartphones became popular, many messaging services have been launched. WhatsApp, which is a free messaging service owned by Facebook Inc., has emerged as one of the most popular messaging apps on mobile devices today. And as more and more people use WhatsApp as a means of communication, the importance of securing its users’ business or private communications has become more imperative. Users of the app expect a reasonable amount of privacy for all their communications. To meet this expectation, WhatsApp in 2014 introduced End-to-End Encryption (E2EE) technology. This allows for data between communicating parties to be secure, free from eavesdropping, and hard to crack. This technology offers peace of mind to end users because their data are safe in transit, and third parties or even WhatsApp itself cannot access them; thus messages can only be decrypted by the recipient.

However, the ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have, however, argued against a “backdoor”; they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it.

In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presented the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research also presented the benefits encryption had on consumer security and privacy, and also on the challenges it posed to public safety and national security.

Article by Robert E. Endeley, from Capitol Technology University, Laurel, MD, USA.

Full access: http://mrw.so/2m6oro
Image by App Italia, from Flickr-cc.

评论

此博客中的热门博文

Electron Spin and Proton Spin in the Hydrogen and Hydrogen-Like Atomic Systems

Read full paper at: http://www.scirp.org/journal/PaperInformation.aspx?PaperID=52202#.VIj7tMnQrzE Author(s) Stanisław Olszewski * Affiliation(s) Institute of Physical Chemistry, Polish Academy of Sciences, Warsaw, Poland . ABSTRACT The mechanical angular momentum and magnetic moment of the electron and proton spin have been calculated semiclassically with the aid of the uncertainty principle for energy and time. The spin effects of both kinds of the elementary particles can be expressed in terms of similar formulae. The quantization of the spin motion has been done on the basis of the old quantum theory. It gives a quantum number n = 1/2 as the index of the spin state acceptable for both the electron and proton ...

Remarks on the Complexity of Signed k-Domination on Graphs

Read  full  paper  at: http://www.scirp.org/journal/PaperInformation.aspx?PaperID=53574#.VMnXsCzQrzE Author(s)    Chuan-Min Lee 1 , Cheng-Chien Lo 1 , Rui-Xin Ye 2 , Xun Xu 2 , Xiao-Han Shi 2 , Jia-Ying Li 2 Affiliation(s) 1 Department of Computer and Communication Engineering, Ming Chuan University, The First American University in Asia, Taoyuan, Taiwan, Chinese Taipei . 2 Department of Electronic Information Engineering, Fuzhou University, Fuzhou, China . ABSTRACT This paper is motivated by the concept of the signed k-domination problem and dedicated to the complexity of the problem on graphs. For any fixed nonnegative integer k, we show that the signed k-domination problem is NP-complete for doubly chordal graphs. For strongly chordal graphs and distance-hereditary graphs, we show that the signed k-domination problem can be solved in polynomial time. We also show that the problem is linear-time solvable for trees, interval graphs, and chord...

A Review of Technical Requirements for High Penetration of Wind Power Systems

Read full paper at: http://www.scirp.org/journal/PaperInformation.aspx?PaperID=52361#.VJN8VcCAM4 Author(s)    Yuan-Kang Wu 1 , Tung-Ching Lee 2 , Ting-Yen Hsieh 2 , Wei-Min Lin 2 Affiliation(s) 1 Department of Electrical Engineering, National Chung-Cheng University, Chiayi, Taiwan . 2 Green Energy and Environment Research Laboratories, Industrial Technology Research Institute, Hsinchu, Taiwan . ABSTRACT Renewable portfolio targets have been established in many regions around the world. Regional targets such as 20% renewable energy by year 2020 are not uncommon. As the levels of wind power penetration increase, there are many power system impacts. This work investigated possible challenges and technic...