
Senior government officials, by mistake, called on the editor -in -chief of the Atlantic Ocean for collective chatting on the signal of the application of the correspondence, as the conversation of the conversation was American air strikes against the rebel groups in Yemen. The use of the application by high -ranking national security officials raised the question: How safely is the indication of any case?
On March 11, Jeffrey Goldberg was invited from the Atlantic Ocean by accidentally by the Trump National Security Adviser to communicate with the sign. In the following days, Goldberg was added to a group chat that talked about “the operational details about the coming strikes on Yemen, including information about the targets, the weapons that the United States will publish and the attack sequence,” according to what I mentioned. Reports.
The reference is a free application that cybersecurity experts consider one of the most secure messaging services due to a comprehensive encryption.
Simply put, text messages or calls are only seen by you, the sender and everyone who is in the sign chat.
“We cannot read your messages or listen to your calls, and no one else can either,” says Al -Inshara.
If you are using the virtual messaging app for your smartphone only, such as IMessage or Google messages from Apple, there is an opportunity that your messages will not be safe. This happens when you are an iPhone user that sends a text message to the Android user, because you are a terrace from different platforms. The messages are encrypted from comprehensive to party only if both people use the same app.
The signal also tells the user protection because it does not use ads and does not track user data. He – she It only collects the minimum user data, Like your phone number, the date you joined in the signal and the last date that you log in to the application.
Regardless of senior government officials, journalists and preachers use application, but it is not limited to these groups of people.
With reference to the news, experts study whether the average user should consider it an option to communicate daily.
Why should you care about encrypted messages?
Fahid Biddan, assistant professor of cyberspace, networks, data and computer science at New Haven University, said that encrypted messages “protect more than national secrets; they protect daily privacy.”
Most people share sensitive information through text, such as personal addresses, Netflix passwords and other accounts, or images, according to ISKANDER SANCHEZ-ROLA, the director of artificial intelligence and innovation of Norton.
Crystate applications are confirmed on your messages only by the person you intend to access – not third parties. This also means that “the Internet service provider or any potentially vulnerable representatives on your network will not be able to see it too,” said Sanchez Rola.
Internet criminals pay attention to your messages.
in December Cyber Security Agency and Infrastructure It was reported that the infiltrators of the China government, named Salt Typhoon, launched an attack on commercial telecommunications companies to steal user data and prompted federal authorities to recommend everyone to using encrypted contacts from one side.
“Ninety percent Among all electronic threats that are now arising from fraud and social engineering threats-a number that has doubled almost three times since 2021, Sanchez-Rola can open that daily activities such as redirecting messages or even clicking on links and attachments can open the door to risks if your information is not properly protected. “
By using the correspondence application that guarantees encryption from one side to the party, Behzadan said, you protect yourself from data violations and identity stealing, tracking companies and directing advertising, ensuring confidentiality in professional or legal communications, freedom from monitoring or non -banking access, and insurance against potential policy that may give up privacy rights.
He said: “In short, encryption helps to maintain digital and independent dignity in an increasingly increasingly world.”
How is it a prominent sign of other correspondence applications when it comes to privacy?
“All contacts (messages, calls, and visual conversations) are default, so you do not have to get out of your way to make sure it is a feature,” Bizadan said.
Unlike many platforms, Signal does not store descriptive data about who users communicate with, when or where.
He said: “Its encryption protocol, which is a wide open -up signal, is a widely -standing standard in safe messaging and uses it even WhatsApp and Facebook Messenger for some chats.”
It is distinguished by the non -profit Signal Import also: The Foundation does not invest in user data, which reduces monitoring incentives or features that depend on advertising.
Sanchez-Rola added some additional features that amplify your privacy securing:
- The screenshot of the screen. This prevents harmful applications on your phone from accessing screenshots, but not preventing others from taking screenshots for your conversations.
- The messages disappear. The messages are automatically deleted after a specified time, composed from five seconds to four weeks, after reading them. Therefore, even if the harmful application gets your phone, it will not be able to recover the messages that have been deleted.
- One show media. This allows you to send photos, videos and audio messages that are automatically deleted from the recipient device after opening them once.
- Pinch of hide. This prevents the third -party keyboard applications from collecting potential data about your writing, providing an additional layer of privacy, especially when sending sensitive information.
- Username names for phone numbers. You can talk to people on a signal without having to know their phone number – just using their username. This provides an additional layer of privacy.
How effective is the signal in protecting your privacy?
Signal service conditions that “are responsible for maintaining your device and calculating your sign are safe and safe.”
Sanchez Rola said: “The effectiveness of encryption is not only related to technology, but also depends on how to use individuals. Encryption works better as part of the largest cyber security strategy,” Sanchez Rola said.
Behzadan shared some of the best important practices. Includes:
- Empowering the disappearance of messages for sensitive chats.
- Check safety numbers with reliable contacts.
- Placement of a strong pin or enabling biological measurement lock.
- Keep the app and the device updated.
- Avoid screenshots or store sensitive information on unprecedented devices.
Bizdan said: “The last incident that includes American officials confirms this: Even the safest technology cannot prevent human error, such as adding the wrong person to a group chat,” Bizdan said. “In cybersecurity, the weakest is a link is often the human element.”
What are other encrypted messaging applications?
While the sign is a better recommendation among security experts, other applications provide encrypted messages with different differentials:
- WhatsAppUses sign protocol but it is owned by Meta and collects more descriptive data.
- TaleSwiss -based application does not require a phone number and focuses on privacy, although it has a smaller user base.
- The element (matrix protocol): The option of decentralization and open source, common among societies with technological cunning.
- Wicker: Used in institutional and government settings and is now owned by Amazon.
The best option depends on your specific needs, your threat model, and the communications forms you use, because encryption only works if both parties use the same basic system.