×

UPSC Courses

DNA banner

DAILY NEWS ANALYSIS

GS-III :
  • 04 October, 2020

  • 5 Min Read

WhatsApp & leaks

WhatsApp & leaks

Context:

  • Television news channels have shared leaked WhatsApp chats of film actors. This has led to concerns whether communication over platforms such as WhatsApp is secure or not. Also, these events have prompted Facebook-owned WhatsApp to come out with a statement on its use of end-to-end encryption to secure user messages.

Does WhatsApp have access to chats?

  • Since the year 2016, WhatsApp has installed an end-to-end encryption system.
  • It claims that it ensures nobody apart from those communicating with each other over the platform can read what is sent, not even WhatsApp.
  • Governments across the world see end-to-end encryption as a huge issue when it comes to law enforcement.
  • While WhatsApp says it responds to requests from law enforcement agencies “based on applicable law and policy,” it is not clear what kind of data it would have to share.
  • News reports have mentioned that these could be in the nature of metadata such as mobile number, IP address, location, and so on.

How is WhatsApp designed to ensure such secure communication?

  • WhatsApp uses the encryption protocol developed by Open Whisper Systems (a project known best for its Signal app) which also uses the same open-source framework to ensure privacy.
  • Many closed messaging applications now use the Signal protocol.
  • Each and every WhatsApp chat has a security code used to verify that calls and the messages that are sent to that chat are end-to-end encrypted.

What is the technology behind this?

  • The technology that forms the basis for this is called the ‘Diffie-Hellman key exchange’.
  • In a 1976 Whitfield Diffie and Martin E. Hellman saw the futility of the old ways of sharing a key securely in the emerging digital world.
  • They proposed a way for secure communication via a method of a shared secret key, and that too when the communication is over a not-so-secure channel.
  • It is all about math and is designed in a way that a third party eavesdropping on an exchange finds it computationally infeasible to arrive at the secret key from the information overheard.

Can’t those who have access to the server read messages?

  • End-to-end encryption removes this vulnerability.
  • WhatsApp also says it does not store messages on its servers once they are delivered.

Can leaks still happen?

  • End-to-end encryption cannot prevent leaks from happening if a third party has access to a device which contains these messages.
  • Encryption also does not help in cases wherein the sender or the receiver of a message shares it with others, a member of a group shares it with others, or messages are stored in a different format on a different application or platform open to others.
  • Through mobile phone cloning technique, data and cellular identity of a device can be copied into a new phone. This can be done with the help of an app and without access to the phone that needs to be cloned. In the process, the transfer of the International Mobile Equipment Identity can also happen.

What are the other vulnerabilities?

  • Bugs that lead others to control a user’s phone are an example of such vulnerabilities.
  • For instance, last year, WhatsApp revealed that surveillance technology developed by Israel’s NSO Group had been used to spy on about 1,400 people across the world, including civil rights activists and journalists in India.

Source: TH


Oceanic Anoxic Event 1a and MASS EXTINCTION

Oceanic Anoxic Event 1a from the Paris Basin (Environment) Paper-3 PMP OAE 1a refers to a period during the Cretaceous Period (145 million years ago and ended 66 million years ago) when Earth's oceans became depleted of oxygen, causing a significant disruption in marine life.  Cause: The event is believed to have been

Viksit Panchayat Karmayogi (Good governance)

Viksit Panchayat Karmayogi (Good governance) Governance GS PAPER-2 PMP Dr. Jitendra Singh launched the ‘Viksit Panchayat Karmayogi’ initiative on Good Governance Day, celebrated to mark the 100th birth anniversary of former Prime Minister Atal Bihari Vajpayee. The initiative, which is part of the broader ‘Prashasan Gaon

Major programmes to control Air Pollution

Major programmes to control Air Pollution National Clean Air Programme? It was launched by the Ministry of Environment, Forests and Climate Change (MoEFCC) in January 2019. It is the first-ever effort in the country to frame a national framework for air quality management with a time-bound reduction target. The

Air pollution and Air quality Measures in India

Air pollution and Air quality Measures in India (Environment) GS Paper-3 P-M-P Air pollution may be defined as the presence of any solid, liquid or gaseous substance including noise and radioactive radiation in the atmosphere in such concentration that may be directly and/or indirectly injurious to humans or other l

Geopolitical Significance of Ports

Geopolitical Significance of Ports (IR)  Act as geopolitical assets: Ports enhance the projection of strategic reach, which helps strengthen the country’s control over important sea and energy supply routes.  E.g. Indian Navy’s staging base at Agalega Islands will enable marine patrols

Toppers

Search By Date

Newsletter Subscription
SMS Alerts

Important Links

UPSC GS Mains Crash Course - RAW Prelims Answer Key 2024