• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Elon Musk Unveils End-to-End Encrypted DMs For Twitter 2.0

You are here: Home / General Cyber Security News / Elon Musk Unveils End-to-End Encrypted DMs For Twitter 2.0
November 29, 2022

Twitter’s new CEO, Elon Musk, has confirmed plans to incorporate end-to-close encryption (E2EE) to immediate messages on the social media system.

The billionaire made the announcement on Twitter on Sunday when he revealed a sequence of screenshots describing his eyesight for “Twitter 2..”

The E2EE aspect for DMs was very first spotted by security researcher Jane Manchun Wong before this thirty day period. She analyzed code alterations in Twitter’s Android application referencing dialogue keys for E2EE chats and posted about it on Twitter.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Perhaps not amazingly, in this day and age, Manchun Wong’s Twitter account no longer exists, but the code snippets are nonetheless available on the WayBackMachine internet site.

“In spite of regardless of what claims could be designed about Twitter’s safe messaging capabilities above the coming weeks, it would be recommended to use caution ahead of entrusting any delicate facts thinking about the steadiness of what appears to be a rushed style and design,” reported Melissa Bischoping, director of endpoint security study at Tanium.

“Any considerable security undertaking with the complexity of one thing like encrypted messaging should not be rushed and – when responsibly executed – would be the end result of months or yrs of growth and tests,” Bischoping additional. “Looking at Twitter’s the latest breakneck rate, this could be a obstacle.”

Furthermore, the executive informed Infosecurity that E2EE also will come with privacy, legal and ethical things to consider.

“It is often applied for reputable, crucial interaction that justifies privacy but can be applied by criminals,” she claimed.

“In addition, users who consider their messages are secure could feel a lot more comfy speaking about sensitive info that could be detrimental in the event the process is breached.”

More attributes teased by Musk for Twitter 2. (also known as by him “The All the things Application”) incorporate promoting as amusement, new movie resources, prolonged-variety Tweets, payments and the relaunch of the notorious Blue Confirmed application, at this time scheduled for early December.

The news arrives weeks after many of Twitter’s C-degree security and privacy executives resigned amid the uncertainty of the company’s foreseeable future.


Some pieces of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «cisa warns of actively exploited critical oracle fusion middleware vulnerability CISA Warns of Actively Exploited Critical Oracle Fusion Middleware Vulnerability
Next Post: The NFT bubble bursting means a brighter future for crypto assets the nft bubble bursting means a brighter future for crypto»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.