One interesting question is becoming popular among messenger users: what is encryption in WhatsApp? Many people received notifications that all their messages and calls were protected by encryption. So what does this mean? The fact that the developers have improved the security of the messenger so that your correspondence remains only yours, thereby significantly increasing the level of security for using WhatsApp.

What is encryption on WhatsApp?

How does encryption work on WhatsApp? Encryption itself is the encoding of data that can then be decoded. Specifically, our favorite messenger uses end-to-end encryption - End-To-End Encryption. This encoding method prevents anyone, not even the developers themselves, from reading your private messages or listening to your calls. At the same time, not only personal, but also group chats are protected.

I think you already understand what encryption is in WhatsApp. This is another messenger security update, but this time it is truly global and reliable. End-to-end encryption in messengers was used for the first time in Telegram. Later it spread to other communication applications.

WhatsApp's end-to-end data protection covers not only your conversations, but also all the files you send and receive, as well as calls.

How to enable WhatsApp encryption?

Not all users received a notification that encryption was enabled. Therefore, those who were deprived of such a notification are wondering: how to enable WhatsApp encryption? There is no need to activate this option separately. Everyone who updated to the latest version of the messenger received encryption of their correspondence and calls by default.

All Android and iOS smartphones are protected by WhatsApp's end-to-end encryption. To make sure, check for app updates. In addition, in the messenger settings will appear new section"Encryption".

How to remove encryption in WhatsApp?

I don’t know why you might need to disable encryption on WhatsApp, because it protects you and your personal data. It is basically impossible to do this, because it is integrated into the messenger at the deepest level. Currently, no message is sent without encoding.

If for some reason you suddenly need to disable encryption in WhatsApp, you can try rolling back the application to an older version and disabling auto-update.

How do I enable security notifications?

To enable security notifications in WhatsApp, you will need:

  • Open the messenger and enter the menu (the method is the same for both Android and iPhone).
  • Next, go to settings.

  • In the "Account" or " Account» open the “Security” tab.

  • Here you will see one single slider, which is responsible for security notifications. If you enable it, you will receive notifications that the message has not been encrypted if encoding fails for some reason.

What is end-to-end encryption

End-to-end encryption is designed to hide transmitted information from unauthorized access using cryptographic locks. To receive a message, each user has a special key that allows them to decrypt the received data. Thanks to end-to-end encryption technology, access transmitted information Even the servers through which it passes cannot.

Whatsapp encryption what is it and what are its features?

Encryption of messages in the messenger means that personal data will not get to strangers. The transmitted information is encrypted using a special cipher, the key to which only the communicating parties have. WhatsApp encrypts not only messages, but also calls, so users can be sure that data will remain inaccessible no matter how they communicate. The peculiarity of this type of encryption is that in each chat the interlocutors have individual keys, this is a QR code or a sixty-digit number, which is a security code. This is only the visible part of the key, full version code is never available. Is it possible to intercept whatsapp messages

Due to the fact that WhatsApp is a popular instant messenger, the interest in it from hackers, intelligence agencies and simply curious people does not wane. Many people are wondering whether it is possible to intercept WhatsApp messages and how to do it. It is impossible to hack someone else's WhatsApp using their phone number, thanks to the end-to-end encryption function. However, human curiosity is ineradicable, which led to the discovery of a vulnerability when connecting to wi-fi using special software. In order to avoid such situations, you simply should not download dubious programs and connect to wi-fi networks in public places. This way the user will protect his confidential data from various “cyber spies”.

How to remove (disable) encryption in WhatsApp

whatsapp made big step to protect confidential data by enabling end-to-end encryption. Since this function is built into the messenger’s program code itself, it is impossible to disable it. Encryption is activated when you first start the program and is always active.

Can the FSB read WhatsApp messages?

End-to-end encryption implies the inability to decrypt data without a special cryptographic key, which is accessible only from the user’s phone and changes for each message sent. Thanks to this function, it is almost impossible to decrypt a message without this data. Therefore, subject to the simplest security measures on the Internet, personal correspondence will not become available to others. Including the special services.

Each of us wants his personal data, correspondence and other confidential information was under reliable protection. However, this is not always possible, since experienced hackers can hack almost any system and use the obtained data against you, as well as debit money from your accounts. Developers of the popular whatsapp apps seriously worried this problem and they took this issue seriously. So, in 2016, users of the application became available with the option WhatsApp encryption , designed to provide an increased level of security.

Whatsapp encryption: what is it?

Many Internet messenger users still don’t really understand what end-to-end encryption is. However, this is very useful feature, thanks to which your text and voice messages, photos, videos, music, documents and other information will not fall into the wrong hands and will not be used against you. Thus, the information will be available only to you and the person with whom you are corresponding. According to the developers, the level of protection is so high that even they cannot view your messages or listen to calls.

The principle of end-to-end encryption is as follows: each message you send is protected by a special lock, the key to which only the recipient has. Encryption occurs in automatic mode so you don't have to configure it yourself in manual mode. In this case, the encoding process takes place directly on your device, and not on the application service.

Important! This function Only available to those using the latest versions of the application. It does not work in older versions, so the developers recommend installing updates as soon as possible, of course, if you do not want to become a victim of hackers.

How to remove end-to-end encryption in WhatsApp?

Many users have a completely natural question about whether it is possible to disable the encoding of personal data in WhatsApp. On this moment developers do not consider such a function useful and appropriate, so it is not provided in the application. If for some reason you need to do this, then the only option is to rollback, that is, remove the updates and use more old version applications. At the same time, do not forget to uncheck the automatic update programs.

Modern instant messengers like WhatsApp are the main tool for online communication. In this regard, interest in them increases, especially in the personal correspondence of other people. Encryption is used to protect it. What is this - end-to-end whatsapp encryption- described in this article.

What is end-to-end encryption

This is a method of protecting information. It is used not only in WhatsApp, but also in other instant messengers. All messages sent to the interlocutor are encrypted with specialized software. Thus, third parties will not be able to see or read the transmitted information.

It's all about the generated key that decrypts the message. It is created by the sender and the recipient. But like any security system, end-to-end encryption is not perfect and will take at least several thousand years to break using modern supercomputers.

This encoding mode in WhatsApp is always enabled and cannot be disabled by the user.

To check the encoding, you can use one of the suggested methods:

The second option is convenient when it is possible to meet the interlocutors live. Then one of them can scan the code of the other, or visually compare the sixty-digit code.

Note! 60 digits of a QR code are only part of the full encryption available to users. This was done for security reasons.

A negative verification result may occur due to providing another conversation code or using outdated version WhatsApp.

Confirmation of the security code is optional.

Using this principle, you can check any of the conversations for guaranteed security.

Why is this necessary?

WhatsApp is on the list of leaders in used Internet messengers. The true cause of the conflict between the law enforcement agencies of states and the company is unknown, but after that WhatsApp made it mandatory to encode the dialogues of its users. Everything is encrypted: text (including emoji), pictures and photos, audio, video and mixed files.

In fact, as in other similar cases, end-to-end encryption was added in order to counter cybercriminals, as well as individuals who could gain access to user conversations. Now even developers cannot read the information transmitted by interlocutors. This encryption is also called "end-to-end encryption".

However, Facebook, as the owner of WhatsApp, recently announced that end-to-end encryption would be removed from the messenger in 2019. According to Zuckerberg, this is due to the fight against terrorism and extremism at the request of the US authorities. It sounds convincing, but we also know that advertising will appear in the program. Coincidence? No, because WhatsApp will now know about users' habits and preferences to provide relevant advertising, which will allow Facebook to cover the cost of acquiring the company.

End-to-end encryption works according to this principle:


The essence of the protection lies in a complex algorithm that encodes information. Therefore, government agencies are demanding that this protection be removed, because even the NSA is unable to cope with it.

conclusions

WhatsApp end-to-end encryption is a method of protecting messages from being viewed by third parties by encoding them with powerful algorithms. At the moment it is built into the messenger by default and cannot be disabled.

Users popular messenger The question of “end-to-end encryption” is often of interest. Does it really keep conversations private? To answer, you will need to consider modern information encryption mechanisms, existing threats and how WhatsApp deals with them. As a preliminary summary, let's say that this messenger is one of the most secure along with Telegram and Viber.

The benefits of end-to-end encryption

Throughout the existence of writing, people have looked for ways to hide the content of correspondence. With the spread of electronic communication, fast and reliable encryption methods were needed, the results of which cannot be cracked in a reasonable time.

The result of end-to-end encryption is that only end users communicating with each other can access the information transmitted to them, regardless of its form: text, photo, document, audio or video.

For complete security, WhatsApp encryption is always enabled and cannot be turned off. This means that not only all correspondence, but also each message is encrypted with a separate key, the pair of which is found only by your interlocutor. How can a stranger read it, and is it even possible in principle? The only way to do this is to steal the phone.

Main security threats

Encryption Confirmation

  1. Enter the chat, click on the contact and open the “ Contact details».
  2. Select "Encryption". A 60-digit numeric code and QR code will appear.
  3. If your interlocutor is nearby, he will confirm your identity by scanning the code. If it is not available, you can copy the digital code and send it by e-mail or SMS for comparison.

After successful confirmation, there is a guarantee that the conversation is encrypted and is really happening with your interlocutor.

We found out how to install end-to-end encryption in WhatsApp, how secure it is and how to avoid possible threats to your privacy. For greater security, delete irrelevant correspondence, since data is stored on WhatsApp servers only until it is received by the end subscriber. Therefore, if you delete received messages, they will disappear in the full sense of the word.

How data is encrypted in 6 popular applications for messaging. And is it worth believing?

On the emergence of instant messengers and the issue of privacy

In the old days, the main means of communication on the Internet was Email(just remember the epic correspondence between Linus Torvalds and Andrew Tanenbaum, and it’s not a fact that someone hacked the mail of one of them, Linus himself published the correspondence in his book “Just for Fun”), no one really thought about any encryption.

But this did not prevent individuals from encrypting/decrypting letters on a local computer, knowing at the same time shared key. But it was not widespread, few people were interested in it. There were times.

In the first half of the 90s, chat rooms became very popular as a means of communication. It should be noted that their popularity was high even until the middle of the first decade of the 21st century. I’m sure all readers of the resource know, and some may remember the chats, so I won’t dwell on them.

ICQ

ICQ appeared in 1996. It was developed by the Israeli company Mirabilis. It was not the first and only instant messaging system, but due to its advantages it became the most popular, for example, at that time, IM application developers chose monetization by selling them, and ICQ was free. At that time there was no talk of encryption.

The proprietary OSCAR protocol was used for data transfer. Two years later, Mirabilis was purchased by the American company AOL and, together with the messenger, belonged to it until 2010. And, in this year, the rights to ICQ were sold to Mail.Ru Group.

After the advent of ICQ, competing instant messaging systems began to appear like mushrooms after rain. During the life of ICQ, a large number of both official modifications and unofficial clients have appeared, examples of which are QIP, Miranda and many others. Among the competing programs seeking to supplant ICQ, MSN Messenger from Microsoft was released in 1999.

The latter sought to become a replacement for the ICQ client using its protocol, but it did not work out; AOL stopped the attempts by changing the protocol.

No mention of any encryption in the official ICQ messenger at that time it was out of the question, since the terms of use stipulated the possibility of using any data transmitted between interlocutors by a third party (AOL) for any purpose. At the same time, alternative clients could implement this opportunity.

This was the twentieth century.

About the need for data encryption

Initially, the need for encryption arose not in order to protect one’s secrets from the “big brother”, but to protect against hackers, interception and modification of data. Users not only send: “Hi, how are you?” along with photographs of cats, but sometimes very valuable and secret information: scans of personal documents, plane tickets, source codes and/or distributions of new programs/games/applications and a lot of other confidential information.

And users would not want someone to be able to easily intercept and read their data (I especially feel sorry for the source codes).

But the vast majority of users were still in infantile ignorance, thinking: “nobody needs my data” and assuming that they were safe. But then, like a bolt from the blue (in 2013), Edward Snowden appeared and ratted everyone out. In short, he said that special. services monitor every message, every phone call, every purchase in the online store.

Users who previously felt protected find themselves in the palm of a “big brother” who is able to look into any intimate affairs. From here the race for encryption began, or rather continued with a new - redoubled zeal.

About encryption

The vast majority of specialists information security recognize end-to-end encryption as the most durable method of protecting information. Therefore, IM system developers implement it in their products. Some have already implemented it, others are on their way to it. But over time, everyone will have it, even industry giants who themselves are not averse to getting into user data.

With end-to-end encryption, the keys used to encrypt and decrypt information are generated and stored only at the end nodes of the correspondence, that is, at its participants. The server side does not take any part in creating the keys and, therefore, does not have access to them, as a result of which it sees only encrypted data transmitted between participants. Only the latter can decode and read the information.

How does end-to-end encryption work? When a communication session begins, 2 keys are generated on each interlocutor’s device: public and private. The latter is used to decrypt data; this key does not leave the local device.

Public key by open channel communication is transmitted to the interlocutor (one or all, if there are several). Using a public key, the interlocutor can only encrypt data, and only the owner of the corresponding private key can decrypt it. Therefore, it does not matter who intercepts the public key. As a result of this, he will only be able to transmit his encrypted data.

Having generated a pair of keys, the interlocutors exchange public keys, after which secure communication begins.

Text, video, audio, files, after being encrypted by the sender, go to the server where they are stored until the recipient is able to receive the data. After this, depending on the strategy of the company that owns the server, the data is either destroyed or stored for another period.

As we can see: end-to-end encryption is good. For modern ICT tools, encryption/decryption will not be an impossible task, not even a difficult task. At the same time, if several interlocutors are involved in a conversation, then when sending a message, it must be encrypted for each one, therefore, as the number of interlocutors increases, the load on the device equally increases. To achieve this, developers are optimizing the means for organizing group conversations.

The idea of ​​end-to-end is not new. In 1991, Phil Zimmerman developed PGP (Pretty Good Privacy) software to encrypt messages and other data. In subsequent years, the algorithm and corresponding software were improved and acquired additional mechanisms.
In 1997, PGP Inc. proposed the OpenPGP initiative, and in 1999, members of the free software Based on the open standard, a free implementation of PGP was created - GnuPG.

This is all to say that since hacking of PGP has not yet been detected, based on the open implementation of PGP (the source codes are available) it is possible to create encryption mechanisms, which is what messenger developers are most likely doing. Don't write from scratch.

Encryption in IM tools

In the 21st century, even more messengers have appeared; we will pay attention only to the most popular ones - those that have withstood the competition.

But first, about ICQ. As mentioned above, in this application, data is transmitted via OSCAR (text messages). In 2008, it became open, but is still not free. The openness of the protocol made it possible to conduct audits by independent researchers, which is an important point in overall confidence in the security of network applications. Many alternative clients, including: Miranda, QiP, have supported PGP-based encryption for quite some time.

However, only in the spring of this year ICQ, in addition to text, received end-to-end encryption on two fronts: audio and video. As we know, this type encryption allows us to avoid reading data by a third party (Mail.ru), but at the same time we remember: the terms of use stipulated the possibility of using any transmitted data.

Skype. Most used

It was created in 2003 by the Luxembourg company Skype Limited (mainly by Estonian programmers). It is still a very popular messenger, obviously due to inertia. In 2011, Skype Limited was acquired by Microsoft. Previously, the latter wanted to buy ICQ, but it didn’t work out; she didn’t miss the second chance with another messenger. Skype has ports for all common devices and operating systems.

At first, Skype used the original proprietary protocol, which all the specialists complained about. service due to the inability to hack it. But, after Microsoft’s purchase, the previous protocol was declared obsolete and replaced by MSNP version 24. The protocol is secure against external attacks because the AES-256 encryption algorithm is used. At the same time, if the interlocutor participates in the conversation from a regular landline or mobile phone, then its data is not encrypted.

However, Microsoft is going special. services for concessions by providing the requested data. Therefore, although the data is transferred between conversation participants in encrypted form, it can be unpacked and read on the server.

After 2003, no one, by and large, dealt with instant messengers for several years, it was not profitable, Skype brought losses almost every year.

WhatsApp. The most popular mobile messenger

This continued until 2009, when WhatsApp appeared. At first, and for a very long time (until the beginning of this year), the application was paid. In addition, there was no encryption. For data transfer, the open and free XMPP protocol, based on XML, is used; it involves the transfer of not only text messages, also audio, video, binary/text files.

Work on the security of the messenger began in 2012 with the encryption of text messages. But only in the spring of this year, end-to-end encryption was introduced not only for text, but also for voice and video messages. Accordingly, after this the server side lost the ability to read user information.

Due to its wild popularity, WhatsApp was acquired by Facebook in 2014. Why did the payment plan change?

Viber. The most popular messenger in Russia

Then, in 2010, Viber appeared - an IM and VoIP telephony tool. But only in the spring of this year, the transmission of any data became encrypted. Of course, the developers have implemented end-to-end encryption.

iMessage. Complete safety is in question

Developed in 2011. The first stage of encryption appears to be strong: the message is encrypted with a combination of a 1280-bit RSA public key and a 128-bit AES algorithm. And, the signature is carried out based on the ECDSA algorithm (Elliptic Curve Digital Signature Algorithm). The interlocutors exchange keys to create encryption. At first glance, everything is cool.

According to the developers, latest versions The messenger uses end-to-end encryption, the inability of company employees to read messages is in question. As mentioned in the “About Encryption” section: when sent, data is stored in encrypted form on the server of the company that owns this server.

At first glance, the situation is standard, but the user’s private key, which remains on the device, has a connection with the user’s password. The latter, in turn, is available from Apple. How else can passwords be recovered if the device is lost? This makes it possible to recover the key and decrypt messages.

Telegram. Legendary MTProto encryption

Appeared in 2013, thanks to the tandem of the Durov brothers. One of the latter tirelessly spreads information about the super safety of his brainchild. Therefore, a lot of debate has been raised regarding the security of Telegram. Absolute safety is a highly controversial issue.

Before sending data using a transport protocol (http, tcp, udp), it is encrypted by the MTProto protocol, a joint development of the brothers. It consists of three independent components: component high level,cryptographic layer, delivery component. The first defines the method by which API requests and responses are converted into binary code.

The second one defines the method that encrypts messages before sending, and the last one defines how messages are transmitted (transport protocol type). During packet preparation, an external header is added to the top of the message; it is a 64-bit key identifier that uniquely identifies the user and server authorization keys.

Together they represent a 256-bit key and the same bit initialization vector. The latter is used to encrypt the message using the AES-256 algorithm. The encrypted message includes: session, message ID, message sequence number, server salt. This data, in turn, influences the message key.

This way the message is encrypted. Telegram has the option to use end-to-end encryption or allow the server to see the data. Firstly, the second mode serves to avoid attracting unnecessary attention from specialists. services, it is enabled by default.

The first - protected mode is called secret chat (Secret room) and works according to all the laws of end-to-end encryption. The user can enable this mode at will.

However, in both cases, certain time messages are stored on the server. In the first case, they cannot be read, but in the second, they can be read. The duration of this time is controlled by the user.

Results

Today, in terms of security, we can imagine the whole variety of modern instant messengers into two categories: instant messengers that implement full end-to-end encryption and the second category, these are messaging systems that only try to be similar to the first category, although they encrypt sent messages. data, on the server this data can be easily read.

Protecting personal data from access by third parties is exactly what users are looking for in modern instant messengers. For this reason, used in WhatsApp encryption is an indicator that the developers care about their customers and prevent information leakage from chats. Let's take a closer look at how this technology works.

Navigation:

What is end-to-end encryption

Many users still ask a reasonable question: “ WhatsApp end-to-end encryption – what is it?" Let's start with the fact that it works by using end-to-end encryption technology, that is, data exchange occurs between the sender and the recipient without checking the messages by anyone, including even the developers themselves. This applies to all types of information, including:

Technology has emerged as a necessary measure to combat cyberterrorists and government services, which have repeatedly compromised themselves by obtaining data from personal correspondence

How to remove encryption on WhatsApp

It is worth noting that it is impossible to remove end-to-end encryption in WhatsApp. After its introduction, the creators of the messenger left only the ability to view unique code cipher, available to the participants in the dialogue. You can do this as follows:



After which a combination of numbers and a QR code will appear, which should match that of your contact.

In conclusion, it should be noted that such innovations are necessary for saving personal correspondence and sent files, so there is simply no need to disable it.

, April 7, 2016

End-to-end encryption in WhatsApp, no less, means 100% confidentiality of correspondence, which becomes available exclusively to the interlocutors involved in communication, excluding tracking by outsiders.

Last night I exchanged instant messages on WhatsApp with a friend from another city, when a notification about the launch of end-to-end encryption of messages and calls was displayed on the screen.

What such end-to-end encryption?

End-to-end encryption technology (also called “end-to-end” encryption" or " E2EE) is a method of data transmission in which only the sender and recipient have access to the transmitted information. In the case of WhatsApp this means that messages, calls, photos or videos sent and received are fully encrypted using special cryptographic keys. The decryption key is available exclusively to the interlocutor, so neither interceptors, nor government agencies, nor even the server itself will be able to decrypt messages. WhatsApp, through which data is transferred. Even in the case of hypothetical interception of information by attackers, the use modern technology encryption makes it almost impossible to gain access to its contents.

Your messages in the servicewhatsapp is now 100% confidential (in the newest version of the program )

I confess in good spirit - although I have nothing to hide, I still don’t want anyone else to read my personal correspondence, listen to my calls or look through family photos. Thanks to new feature E2EE encryption in the popular messenger, all correspondence is securely encrypted and in order to gain access to it and its contents, now you have to try very hard, which in my case (as in the case of the lion's share of the messenger's audience), is hardly likely.

Yours messages encrypted?

Great news - WhatsApp configured encryption of all transmitted data by default for all users of the latest version of the program. All you need to do for this is update the messenger. It is important to emphasize that encryption technology is only effective when your interlocutor is using the latest version of the program WhatsApp. If even one group member does not use latest version program, all its participants automatically become at risk of compromise. If you want to check the status of your chats, click on the person's image. The bottom of the dialog box that appears will indicate whether encryption is enabled.

In the picture below you can see that one of my group members has not yet updated WhatsApp, so all information published in the group is unencrypted.

A step forward to personal privacy

Filip Chytry, head of mobile threat research at Avast, said in this regard: “It's just great thatwhatsapp began to encrypt all data exchange in its service by default, following the existing security standard that has been used for quite some time, for example, in the T messenger elegram. For the average user, this means a guarantee of confidentiality of personal correspondence, which in itself is good news.

Thanks to encryption, now even WhatsApp itselfcannot view the correspondence of its users. In fairness, it is worth noting that this does not yet apply to meta data, that is, WhatsAppcan still see who exactly you are chatting with, but not the content of your conversation.”

Transition WhatsApp messenger The move to fully encrypt user correspondence occurred against the backdrop of a rapid increase in incidents of confidential data leaks, increasing surveillance of users by government agencies and large corporations, when the topic of privacy on the Internet is widely discussed not only by professionals, but also among a wide range of ordinary users. All the more significant is the fact that one update to the messenger version is enough to protect a billion people from tracking personal correspondence by outsiders.

follow the newsAvastin networks

Claims that all encrypted instant messengers are vulnerable, and especially Whatsapp. The material caused a lot of noise, but is it really so sad? Internet security expert company Open Whisper Systems claims that nothing new was written in The Guardian and that they attacked WhatsApp in vain.

Last spring, Whatsapp released the biggest update in its history - the addition of a forced end-to-end encryption feature, which essentially means that no one, including Whatsapp, can read your correspondence. Yesterday's investigation by The Guardian presents the opinion of an expert who claims that Whatsapp deliberately left a “backdoor” in its code for possible interception of messages by intelligence agencies and other interested parties. The Whatsapp developers themselves claim that this is not at all true, and that the potentially unsafe behavior of their application is nothing more than making life easier for their many users.

Whatsapp messaging security was developed with the help of Open Whisper Systems, the same company that developed the most secure messenger in the world - Signal, and in its blog the company describes in detail how everything works. WhatsApp has implemented the Signal protocol (and it has also been implemented in the recent Google Allo), which issues each user two security keys: a public key by which other users can identify him and a personal private key that will be assigned to the device. As people change their phones and apps frequently, your security keychain will change accordingly. Users can ensure the privacy of their communications within Whatsapp by checking the security code on each device participating in the conversation - if the codes match, this will mean that there is no interception of messages between the interlocutors (this type of attack is called man-in-the-middle, MITM).

The Guardian is based on an investigation by Tobias Belter. He claims that the Whatsapp server can be hacked based on requests from third parties. That is, WhatsApp can generate a new security key and issue it to these same third parties until users notice that something has happened. In the Signal app messenger, any substitution of the security key results in the inability to send a message and a security warning, and all this happens before the user is about to forward the message again and independently. In Whatsapp, the user receives a notification about a key change, and the message will be automatically recoded to the new key and sent to the recipient. That is, only then will you be able to find out whether the new key actually matches your recipient. Despite the fact that this warning setting in your Whatsapp still needs to be enabled manually:

Open Whisper Systems explains this behavior of Whatsapp by the ideological simplicity of using the messenger. Also, Whatsapp servers do not know who has enabled the warning setting and who has not - so a hacking attempt can be quickly detected. In any case, Whatsapp “lawyers” insist that such a security policy can be called whatever you like, but it is not a vulnerability or a backdoor. This is a “feature”.

Many Western security experts agree with Open Whisper Systems' findings:

Users of the popular messenger are often interested in the question of “end-to-end encryption”. Does it really keep conversations private? To answer, you will need to consider modern...

Users of the popular messenger are often interested in the question of “end-to-end encryption”. Does it really keep conversations private? To answer, you will need to consider modern...