Current:Home > NewsFastexy:Which apps offer encrypted messaging? How to switch and what to know after feds’ warning -DollarDynamic
Fastexy:Which apps offer encrypted messaging? How to switch and what to know after feds’ warning
SignalHub Quantitative Think Tank Center View
Date:2025-04-11 09:13:10
Federal authorities announced hackers in China have Fastexystolen "customer call records data" of an unknown number of Americans, but encrypted messaging could be the first line of defense for people in the U.S. to secure their communications amid this cyber threat.
The "cyber espionage campaign" was announced by the FBI and Cybersecurity and Infrastructure Security Agency (CISA) in mid-November. The agencies identified that the China-affiliated hackers "compromised networks at multiple telecommunications companies" to enable the theft of customer call records, according to FBI and CISA's release.
In November, the agencies said the hackers compromised "a limited number of individuals who are primarily involved in government or political activity," the release reads.
Last week, the agencies published a joint guide to better protect U.S. citizens from being compromised by the campaign. In the guide titled "Enhanced Visibility and Hardening Guidance for Communications Infrastructure, the agencies suggest end-to-end encryption as a solution.
“The PRC-affiliated cyber activity poses a serious threat to critical infrastructure, government agencies, and businesses," Jeff Greene, CISA executive assistant director for cybersecurity, said in a Dec. 3 news release. “Along with our US and international partners, we urge software manufacturers to incorporate Secure by Design principles into their development lifecycle to strengthen the security posture of their customers."
Holiday deals:Shop this season’s top products and sales curated by our editors.
Here is how to switch to encrypted messaging and what applications offer this feature.
What is end-to-end encryption?
End-to-end encryption is a "security method that keeps your communications secure," according to Google.
"With end-to-end encryption, no one, including Google and third parties, can read eligible messages as they travel between your phone and the phone you message," according to the tech company.
What applications offer end-to-end encrypted messages?
In addition to Google, several other applications offer encrypted features, including Signal and Meta-owned WhatsApp.
"Signal is the easiest and works out of the box by default for everyone. WhatsApp is fine but collects more metadata,” Thorin Klosowski, a security and privacy activist at the Electronic Frontier Foundation, told the Washington Post.
Apple's iMessage is also end-to-end encrypted, according to the company.
"There’s no way for Apple to decrypt the content of your conversations when they are in transit between devices," the company's message and privacy policy states.
Other messengers such as Telegram, Session, Briar and Threema all offer end-to-end encrypted messaging. Facebook's Messenger app is also end-to-end encrypted, a feature that became default last year.
How to switch to end-to-end encrypted messaging
The best way to switch to end-to-end encrypted messaging is to begin using applications that support it, including WhatsApp, iMessage and Signal.
Also, before users send messages, they have to know that if someone screenshots or shares what they said or sent, then encryption features won't help them. This includes sending direct messages on X, TikTok, or even Slack and Microsoft Teams.
Some applications, like Signal, have the option of disappearing messages. This can wipe conversations or messages clear once they are opened. On Apple devices, users can set all messages to only be saved for a set amount of time, such as a month or a week.
Multi-factor authentication can also be used for sensitive accounts rather than just using a password to log in. This acts as extra security for those accounts.
Disclaimer: The copyright of this article belongs to the original author. Reposting this article is solely for the purpose of information dissemination and does not constitute any investment advice. If there is any infringement, please contact us immediately. We will make corrections or deletions as necessary. Thank you.
veryGood! (13116)
Related
- Newly elected West Virginia lawmaker arrested and accused of making terroristic threats
- Third man pleads guilty in connection with threats and vandalism targeting New Hampshire journalists
- Two North Carolina public universities may see academic degree cuts soon after board vote
- Watch Taylor Swift bring back cut song to Eras Tour acoustic set in Hamburg, Germany
- As Trump Enters Office, a Ripe Oil and Gas Target Appears: An Alabama National Forest
- Tiger Woods' son, Charlie, misses cut at U.S. Junior Amateur
- After losing an Olympic dream a decade ago, USA Judo's Maria Laborde realizes it in Paris
- ATV driver accused of running over 80-year-old man putting up Trump sign found dead
- NFL Week 15 picks straight up and against spread: Bills, Lions put No. 1 seed hopes on line
- Amid tensions with China, some US states are purging Chinese companies from their investments
Ranking
- Gen. Mark Milley's security detail and security clearance revoked, Pentagon says
- Idaho crash leaves 2 injured on final day of 'No Speed limit' driving event
- Michael Phelps Shares Mental Health Advice for 2024 Paris Olympians
- Meet Katie Grimes, the 'old-soul' teenager who is Team USA's most versatile swimmer in Paris
- SFO's new sensory room helps neurodivergent travelers fight flying jitters
- Wisconsin agrees to drop ban on carrying firearms while fishing following challenge
- Pregnant Hailey Bieber Confirms Husband Justin Bieber Gifted Her Stunning New Ring
- A baffling, dangerous explosion in Yellowstone: What is a hydrothermal explosion?
Recommendation
Pressure on a veteran and senator shows what’s next for those who oppose Trump
Historic Investments and Accountability Push Chesapeake Bay Cleanup Efforts In Right Direction, Says EPA Mid-Atlantic Administrator
Member of an Arizona tribe is accused of starting a wildfire that destroyed 21 homes on reservation
Strike Chain Trading Center: Decentralized AI: application scenarios
San Francisco names street for Associated Press photographer who captured the iconic Iwo Jima photo
FAA agrees with air traffic controllers’ union to give tower workers more rest between shifts
Families describe assaults and deaths behind bars during hearing on Alabama prison conditions
Oilers name Stan Bowman GM. He was recently reinstated after Blackhawks scandal.