{"id":6065,"date":"2018-12-18T09:45:03","date_gmt":"2018-12-18T15:45:03","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6065"},"modified":"2019-01-08T13:42:27","modified_gmt":"2019-01-08T19:42:27","slug":"a-quick-guide-to-encrypted-messaging","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/a-quick-guide-to-encrypted-messaging\/","title":{"rendered":"A Quick Guide to Encrypted Messaging"},"content":{"rendered":"<p><span style=\"color: #000000; font-family: verdana, geneva, sans-serif;\"><strong>By Des Nnochiri<\/strong><\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">With it now being so easy to share information, we have a tendency to over-divulge. We check into public places online, tell the world when we\u2019re going on holiday and where, and send and receive risqu\u00e9 photos. However, when it became public knowledge that the NSA, internet service providers, and trusted social media platforms were able to monitor our private messages, the choice to share or not to share was taken away from us.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">User data is a commodity, but what we allow companies to know should be left up to us. Due to growing alarm over misuse of user data, encrypted messaging systems have seen a sharp rise in popularity<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">What Is Encryption?<\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Encryption isn\u2019t new, but it is typically something the security-conscious have to do manually, making it infeasible for many casual technology users. Put simply, encryption is a security measure that takes plaintext data\u2014i.e. something easily readable by human eyes\u2014and transforms it into a series of seemingly-unrelated symbols, letters, or numbers. In order for the original data to be viewed, it must be reverted back to its plaintext form using a key.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">There are two main types of encryption: public key and private key. They have the same intended effect\u2014allowing certain data to only be viewed by an authorized party\u2014but they achieve this in slightly different ways.<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">What Is Encrypted Messaging?<\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Encrypted messaging uses a method known as end-to-end encryption, which is briefly explained in the infographic below.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/encryption.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6067\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/encryption-240x300.png\" alt=\"\" width=\"275\" height=\"344\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/encryption-240x300.png 240w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/encryption-768x960.png 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/encryption-819x1024.png 819w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/encryption.png 1200w\" sizes=\"auto, (max-width: 275px) 100vw, 275px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">(Image source: <a href=\"http:\/\/www.chatmap.io\/blog\/end-to-end-encryption-explained.php\" rel=\"nofollow\" target=\"_blank\">www.chatmap.io<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>)<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">This means that if a message is intercepted or monitored by a third-party during transit, it will appear unreadable to them, making this system invaluable for the transmission of confidential information.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Data can be encrypted in transit, in storage, or using this all-encompassing end-to-end encryption. The latter tends to be the preferred method, as only protecting data in transit or in storage can still leave it somewhat vulnerable to tampering and surveillance by unauthorized parties.<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">What Makes Encrypted Messaging Safer?<\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Whether you\u2019re dealing with a client\u2019s personal information, or you just want to be confident that your private conversations remain private, encryption adds a crucial layer of security.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">As shown in the infographic above, a simple text message goes through a series of steps to distort the message\u2019s content. The content is then only revealed to individuals who have permission to view it, which is determined by the keys. When this level of encryption is applied to emails and official communications, the sensitive information gets securely bundled up for quick, safe transmission.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/encrypted-msging.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6071 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/encrypted-msging.jpg\" alt=\"\" width=\"300\" height=\"225\"><\/a><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">The standard messaging service provided by most cell service providers is unencrypted, allowing the service carrier to take a peek at their users\u2019 conversations should they want to do so. If they choose, they can also then share that information with other companies.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Although websites like Facebook offer a high level of account security, they have also <a href=\"https:\/\/variety.com\/2018\/digital\/features\/facebook-privacy-crisis-big-data-mark-zuckerberg-1202741394\/\" rel=\"nofollow\" target=\"_blank\">made headlines<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> for gleaning and sharing user information from what were initially believed to be private conversations. Facebook has now introduced an encrypted feature in Messenger, in which users can choose to encrypt their messages and have them disappear a short time after being read.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Services like Slack remain a popular method of inter-office communication, but they are often unencrypted, making them less than ideal for businesses that deal in sensitive information such as passwords. A recently developed browser plugin, <a href=\"https:\/\/gizmodo.com\/shhlack-lets-you-encrypt-slack-messages-so-your-boss-ca-1825760952\" rel=\"nofollow\" target=\"_blank\">Shhlack<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, allows for end-to-end encryption of private messages, but so far encryption has not been implemented into the base product.<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Which Apps Allow for Encrypted Messaging?<\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Many people assume that widely-used apps and services are trustworthy; they must be, as so many people trust them, right? But blunders by big companies like Facebook have illustrated how important it is to know which services are genuinely secure, and they are typically the ones that use end-to-end encryption.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Depending on your business or personal needs, you have a number of options to choose from. Too many abound to list comprehensively here, so we\u2019ve picked out some of the biggest names. Due to the widespread need for these kinds of services, many of them are completely free.\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\"><br>\n<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/messaging-apps.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6079\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/12\/messaging-apps.jpg\" alt=\"\" width=\"300\" height=\"186\"><\/a><\/span><\/p>\n<p><strong><span style=\"font-family: 'Arial',sans-serif;\">1. <a href=\"https:\/\/www.whatsapp.com\/\" rel=\"nofollow\" target=\"_blank\">WhatsApp<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/strong><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">This is possibly the best-known service on this list. WhatsApp introduced end-to-end encryption in 2016 and has since been acquired by Facebook. All of the encryption is done for you, and the user experience is no different to using standard SMS. However, like all apps on this list, it uses Wi-Fi and mobile data rather than cell service to send and receive its encrypted messages.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><strong><span style=\"font-family: 'Arial',sans-serif;\">2. <a href=\"https:\/\/signal.org\/\" rel=\"nofollow\" target=\"_blank\">Signal<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/strong><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">This free app provides secure end-to-end decryption on iPhone, Android, and desktops. All communications\u2014from text messages, to pictures, to phone calls\u2014are encrypted, with not even the Signal developers having access to them. Users can schedule automatic message deletion to occur periodically.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><strong><span style=\"font-family: 'Arial',sans-serif;\">3. <a href=\"https:\/\/www.viber.com\/security\/\" rel=\"nofollow\" target=\"_blank\">Viber<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/strong><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">This is another app that uses end-to-end encryption to protect your private messages and phone calls. It\u2019s the second-most used encrypted messaging app after WhatsApp, with almost 1 billion users worldwide. Much like Signal, Viber cannot read your messages, and the company promises its users that it will not sell their personal information. <\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Final Thoughts <\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">As always, we suggest doing thorough research when looking to try out some new software, particularly if it is going to be used in the transmission or storage of sensitive information. Thankfully, it\u2019s not difficult to find secure apps for such purposes, with many now using end-to-end encryption as their default. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Des Nnochiri \u00a0 With it now being so easy to share information, we have a tendency to over-divulge. We check into public places online, tell the world when we\u2019re going on holiday and where, and send and receive risqu\u00e9 photos. However, when it became public knowledge that the NSA, internet service providers, and trusted [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":6072,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,42],"tags":[304,295,291,292,23,44,268,294,269,24,284,202,297,299,100,303,224,298,286,293,288,99,290,287,289,29,296,301,219,305,306,285,302,300],"class_list":["post-6065","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-security","tag-android","tag-app-security","tag-authorization","tag-authorized-party","tag-data","tag-data-misuse","tag-data-security","tag-data-sharing","tag-data-storage","tag-data-use","tag-encrypted-messaging","tag-encryption","tag-facebook","tag-facebook-messenger","tag-invasion-of-privacy","tag-iphone","tag-messaging","tag-messenger","tag-nsa","tag-permission","tag-plaintext","tag-privacy","tag-private-key","tag-private-messaging","tag-public-key","tag-security","tag-shhlack","tag-signal","tag-social-media","tag-text-messaging","tag-texting","tag-user-data","tag-viber","tag-whatsapp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6065"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6065\/revisions"}],"predecessor-version":[{"id":6086,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6065\/revisions\/6086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6072"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}