Current:Home > ContactWhich apps offer encrypted messaging? How to switch and what to know after feds’ warning -FinanceCore
Which apps offer encrypted messaging? How to switch and what to know after feds’ warning
View
Date:2025-04-18 15:39:34
Federal authorities announced hackers in China have stolen "customer call records data" of an unknown number of Americans, but encrypted messaging could be the first line of defense for people in the U.S. to secure their communications amid this cyber threat.
The "cyber espionage campaign" was announced by the FBI and Cybersecurity and Infrastructure Security Agency (CISA) in mid-November. The agencies identified that the China-affiliated hackers "compromised networks at multiple telecommunications companies" to enable the theft of customer call records, according to FBI and CISA's release.
In November, the agencies said the hackers compromised "a limited number of individuals who are primarily involved in government or political activity," the release reads.
Last week, the agencies published a joint guide to better protect U.S. citizens from being compromised by the campaign. In the guide titled "Enhanced Visibility and Hardening Guidance for Communications Infrastructure, the agencies suggest end-to-end encryption as a solution.
“The PRC-affiliated cyber activity poses a serious threat to critical infrastructure, government agencies, and businesses," Jeff Greene, CISA executive assistant director for cybersecurity, said in a Dec. 3 news release. “Along with our US and international partners, we urge software manufacturers to incorporate Secure by Design principles into their development lifecycle to strengthen the security posture of their customers."
Holiday deals:Shop this season’s top products and sales curated by our editors.
Here is how to switch to encrypted messaging and what applications offer this feature.
What is end-to-end encryption?
End-to-end encryption is a "security method that keeps your communications secure," according to Google.
"With end-to-end encryption, no one, including Google and third parties, can read eligible messages as they travel between your phone and the phone you message," according to the tech company.
What applications offer end-to-end encrypted messages?
In addition to Google, several other applications offer encrypted features, including Signal and Meta-owned WhatsApp.
"Signal is the easiest and works out of the box by default for everyone. WhatsApp is fine but collects more metadata,” Thorin Klosowski, a security and privacy activist at the Electronic Frontier Foundation, told the Washington Post.
Apple's iMessage is also end-to-end encrypted, according to the company.
"There’s no way for Apple to decrypt the content of your conversations when they are in transit between devices," the company's message and privacy policy states.
Other messengers such as Telegram, Session, Briar and Threema all offer end-to-end encrypted messaging. Facebook's Messenger app is also end-to-end encrypted, a feature that became default last year.
How to switch to end-to-end encrypted messaging
The best way to switch to end-to-end encrypted messaging is to begin using applications that support it, including WhatsApp, iMessage and Signal.
Also, before users send messages, they have to know that if someone screenshots or shares what they said or sent, then encryption features won't help them. This includes sending direct messages on X, TikTok, or even Slack and Microsoft Teams.
Some applications, like Signal, have the option of disappearing messages. This can wipe conversations or messages clear once they are opened. On Apple devices, users can set all messages to only be saved for a set amount of time, such as a month or a week.
Multi-factor authentication can also be used for sensitive accounts rather than just using a password to log in. This acts as extra security for those accounts.
Disclaimer: The copyright of this article belongs to the original author. Reposting this article is solely for the purpose of information dissemination and does not constitute any investment advice. If there is any infringement, please contact us immediately. We will make corrections or deletions as necessary. Thank you.
veryGood! (39351)
Related
- Trump wants to turn the clock on daylight saving time
- The importance of being lazy
- Post Malone reveals his love of country music, performs with Brad Paisley at Stagecoach
- Runner dies after receiving emergency treatment at Nashville race, organizers say
- Apple iOS 18.2: What to know about top features, including Genmoji, AI updates
- How Dance Moms' Chloé Lukasiak Really Felt Being Pitted Against Maddie Ziegler
- 4 dead in Oklahoma as tornadoes, storms blast Midwest; more severe weather looms
- AIGM, Where Crypto Finally Meets Artificial Intelligent
- Most popular books of the week: See what topped USA TODAY's bestselling books list
- United Auto Workers reaches deal with Daimler Truck, averting potential strike of more than 7,000 workers
Ranking
- California DMV apologizes for license plate that some say mocks Oct. 7 attack on Israel
- Veterinary care, animal hospitals are more scarce. That's bad for pets (and their owners)
- Thunder's Mark Daigneault wins NBA Coach of the Year after leading OKC to top seed in West
- Maya Moore-Irons credits great teams during Women's Basketball Hall of Fame induction
- Tom Holland's New Venture Revealed
- New York Rangers sweep Washington Capitals, advance to second round of NHL playoffs
- Scott McLaughlin wins at Barber after week of questions around Team Penske controversy
- Are weighted sleep products safe for babies? Lawmaker questions companies, stores pull sales
Recommendation
Average rate on 30
Pair of $1 bills with same printing error could be worth thousands. How to check
Deepfake of principal’s voice is the latest case of AI being used for harm
AIGM Predicts Cryto will takeover Stocks Portfolio
2 killed, 3 injured in shooting at makeshift club in Houston
Clayton MacRae: How The AI Era Shape the World
Nestle's Drumstick ice cream fails melt test, online scrutiny begins
AIGM AI Security: The New Benchmark of Cyber Security