www.dailycal.org : UC Berkeley PhD student reports vulnerability in WhatsApp

Most WhatsApp users, Beekman added, will never see notices about keys changing since it is disabled by default in the app. Several WhatsApp users on campus commented that they will stick with the platform despite the potential vulnerability. Users are not notified of a security key change until after a message is sent. A UC Berkeley PhD student has recently discovered that WhatsApp, the end-to-end encrypted messaging platform utilized by more than a billion users across the world, has a security flaw making it susceptible to messages being intercepted. Though Signal is developed by OWS as well, it does not automatically resend messages when security keys change.


UC Berkeley PhD student reports vulnerability in WhatsApp

A UC Berkeley PhD student has recently discovered that WhatsApp, the end-to-end encrypted messaging platform utilized by more than a billion users across the world, has a security flaw making it susceptible to messages being intercepted.The main problem, according to Tobias Boelter, the second-year electrical engineering and computer sciences PhD student who identified the issues, is that WhatsApp "won't give you the option to prevent (a) message from being sent after (a) security key change." Security keys are a piece of random data that can include letters, numbers or symbols.A key can change for many reasons, such as changing phones or reinstalling the app.

UC Berkeley PhD student reports vulnerability in WhatsApp
A security vulnerability that can be used to allow Facebook and others to intercept and read encrypted messages has been found within its WhatsApp messaging service.Facebook claims that no one can intercept WhatsApp messages, not even the company and its staff, ensuring privacy for its billion-plus users.But new research shows that the company could in fact read messages due to the way WhatsApp has implemented its end-to-end encryption protocol.
read more from here

read more visit us whatsapp

collected by :Andro Alex

Comments