×

UPSC Courses

DNA banner

DAILY NEWS ANALYSIS

GS-III :
  • 04 October, 2020

  • 5 Min Read

WhatsApp & leaks

WhatsApp & leaks

Context:

  • Television news channels have shared leaked WhatsApp chats of film actors. This has led to concerns whether communication over platforms such as WhatsApp is secure or not. Also, these events have prompted Facebook-owned WhatsApp to come out with a statement on its use of end-to-end encryption to secure user messages.

Does WhatsApp have access to chats?

  • Since the year 2016, WhatsApp has installed an end-to-end encryption system.
  • It claims that it ensures nobody apart from those communicating with each other over the platform can read what is sent, not even WhatsApp.
  • Governments across the world see end-to-end encryption as a huge issue when it comes to law enforcement.
  • While WhatsApp says it responds to requests from law enforcement agencies “based on applicable law and policy,” it is not clear what kind of data it would have to share.
  • News reports have mentioned that these could be in the nature of metadata such as mobile number, IP address, location, and so on.

How is WhatsApp designed to ensure such secure communication?

  • WhatsApp uses the encryption protocol developed by Open Whisper Systems (a project known best for its Signal app) which also uses the same open-source framework to ensure privacy.
  • Many closed messaging applications now use the Signal protocol.
  • Each and every WhatsApp chat has a security code used to verify that calls and the messages that are sent to that chat are end-to-end encrypted.

What is the technology behind this?

  • The technology that forms the basis for this is called the ‘Diffie-Hellman key exchange’.
  • In a 1976 Whitfield Diffie and Martin E. Hellman saw the futility of the old ways of sharing a key securely in the emerging digital world.
  • They proposed a way for secure communication via a method of a shared secret key, and that too when the communication is over a not-so-secure channel.
  • It is all about math and is designed in a way that a third party eavesdropping on an exchange finds it computationally infeasible to arrive at the secret key from the information overheard.

Can’t those who have access to the server read messages?

  • End-to-end encryption removes this vulnerability.
  • WhatsApp also says it does not store messages on its servers once they are delivered.

Can leaks still happen?

  • End-to-end encryption cannot prevent leaks from happening if a third party has access to a device which contains these messages.
  • Encryption also does not help in cases wherein the sender or the receiver of a message shares it with others, a member of a group shares it with others, or messages are stored in a different format on a different application or platform open to others.
  • Through mobile phone cloning technique, data and cellular identity of a device can be copied into a new phone. This can be done with the help of an app and without access to the phone that needs to be cloned. In the process, the transfer of the International Mobile Equipment Identity can also happen.

What are the other vulnerabilities?

  • Bugs that lead others to control a user’s phone are an example of such vulnerabilities.
  • For instance, last year, WhatsApp revealed that surveillance technology developed by Israel’s NSO Group had been used to spy on about 1,400 people across the world, including civil rights activists and journalists in India.

Source: TH


Formation Day

On 1st November, eight Indian states—Andhra Pradesh, Chhattisgarh, Haryana, Karnataka, Kerala, Madhya Pradesh, Punjab, and Tamil Nadu—along with five Union Territories—Andaman and Nicobar Islands, Chandigarh, Delhi, Lakshadweep, and Puducherry—celebrate their Formation Day. This date marks an important milestone in India

Turtle (Kachhua) Wildlife Sanctuary

The Turtle Wildlife Sanctuary, also known as the Kachhua Sanctuary, is located in the Varanasi district of Uttar Pradesh. It is recognised as India’s first freshwater turtle wildlife sanctuary, established to conserve endangered turtle species and support the ecological health of the Ganga River. Location and Extent The sanctuary co

Introduction of AI and Computational Thinking (CT) in

The Ministry of Education plans to introduce Artificial Intelligence (AI) and Computational Thinking (CT) from Class 3 onwards in the 2026–27 academic year. This initiative is part of the National Curriculum Framework for School Education (NCF-SE) 2023 and aligns with the National Education Policy (NEP) 2020. The aim is to prepare student

Sal Tree

Scientists from the Environment Department of Himachal Pradesh University (HPU) in Shimla have recently revealed that the Sal tree (Shorea robusta) is the most effective natural air purifier for combating rising pollution levels. Their findings highlight the tree’s superior capacity to trap dust, absorb gases, and cleanse the air compared

US Resumes Nuclear Weapon Testing

The President of the United States has ordered the resumption of nuclear weapon testing after a gap of 33 years, the last test being in 1992. This decision marks a significant shift in global nuclear policy and has far-reaching implications for geopolitics, the environment, and international security. Status of Global Nuclear Weapon Testing

DNA

03 Dec,2025

Toppers

Search By Date

Newsletter Subscription
SMS Alerts

Important Links

UPSC GS Mains Crash Course - RAW Prelims Answer Key 2024