• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Elon Musk Unveils End-to-End Encrypted DMs For Twitter 2.0

You are here: Home / General Cyber Security News / Elon Musk Unveils End-to-End Encrypted DMs For Twitter 2.0
November 29, 2022

Twitter’s new CEO, Elon Musk, has confirmed plans to incorporate end-to-close encryption (E2EE) to immediate messages on the social media system.

The billionaire made the announcement on Twitter on Sunday when he revealed a sequence of screenshots describing his eyesight for “Twitter 2..”

The E2EE aspect for DMs was very first spotted by security researcher Jane Manchun Wong before this thirty day period. She analyzed code alterations in Twitter’s Android application referencing dialogue keys for E2EE chats and posted about it on Twitter.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Perhaps not amazingly, in this day and age, Manchun Wong’s Twitter account no longer exists, but the code snippets are nonetheless available on the WayBackMachine internet site.

“In spite of regardless of what claims could be designed about Twitter’s safe messaging capabilities above the coming weeks, it would be recommended to use caution ahead of entrusting any delicate facts thinking about the steadiness of what appears to be a rushed style and design,” reported Melissa Bischoping, director of endpoint security study at Tanium.

“Any considerable security undertaking with the complexity of one thing like encrypted messaging should not be rushed and – when responsibly executed – would be the end result of months or yrs of growth and tests,” Bischoping additional. “Looking at Twitter’s the latest breakneck rate, this could be a obstacle.”

Furthermore, the executive informed Infosecurity that E2EE also will come with privacy, legal and ethical things to consider.

“It is often applied for reputable, crucial interaction that justifies privacy but can be applied by criminals,” she claimed.

“In addition, users who consider their messages are secure could feel a lot more comfy speaking about sensitive info that could be detrimental in the event the process is breached.”

More attributes teased by Musk for Twitter 2. (also known as by him “The All the things Application”) incorporate promoting as amusement, new movie resources, prolonged-variety Tweets, payments and the relaunch of the notorious Blue Confirmed application, at this time scheduled for early December.

The news arrives weeks after many of Twitter’s C-degree security and privacy executives resigned amid the uncertainty of the company’s foreseeable future.


Some pieces of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «cisa warns of actively exploited critical oracle fusion middleware vulnerability CISA Warns of Actively Exploited Critical Oracle Fusion Middleware Vulnerability
Next Post: The NFT bubble bursting means a brighter future for crypto assets the nft bubble bursting means a brighter future for crypto»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.