• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
meta details whatsapp and messenger interoperability to comply with eu's

Meta Details WhatsApp and Messenger Interoperability to Comply with EU’s DMA Regulations

You are here: Home / General Cyber Security News / Meta Details WhatsApp and Messenger Interoperability to Comply with EU’s DMA Regulations
March 8, 2024

Meta has provided details on how it intends to carry out interoperability in WhatsApp and Messenger with 3rd-party messaging providers as the Digital Marketplaces Act (DMA) went into outcome in the European Union.

“This permits end users of third-party vendors who select to allow interoperability (interop) to deliver and acquire messages with opted-in end users of possibly Messenger or WhatsApp – both designated by the European Fee (EC) as remaining needed to independently provide interoperability to third-party messaging expert services,” Meta’s Dick Brouwer said.

DMA, which officially became enforceable on March 7, 2024, calls for firms in gatekeeper positions – Apple, Alphabet, Meta, Amazon, Microsoft, and ByteDance – to clamp down on anti-competitive tactics from tech gamers, stage the taking part in discipline, as very well as compel them to open up some of their services to competition.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

As component of its initiatives to comply with the landmark restrictions, the social media giant claimed it expects 3rd-party providers to use the Sign Protocol, which is applied in the two WhatsApp and Messenger for close-to-conclusion encryption (E2EE).

The third-events are also necessary to offer the encrypted communications into information stanzas in eXtensible Markup Language (XML). Should the concept incorporate media articles, an encrypted model is downloaded by Meta purchasers from the third-party messaging servers employing a Meta proxy assistance.

The enterprise is also proposing what is actually named a “plug-and-perform” model that lets 3rd-party companies to join to its infrastructure for achieving interoperability.

“Getting the instance of WhatsApp, 3rd-party customers will join to WhatsApp servers making use of our protocol (primarily based on the Extensible Messaging and Existence Protocol – XMPP),” Brouwer explained.

“The WhatsApp server will interface with a 3rd-party server more than HTTP in get to aid a selection of issues which includes authenticating 3rd-party users and press notifications.”

On top of that, third-party consumers are mandated to execute a WhatsApp Enlistment API when opting into its network, alongside supplying cryptographic proof of their ownership of the third-party person-obvious identifier when connecting or a third-party consumer registers on WhatsApp or Messenger.

Cybersecurity

The specialized architecture also has provisions for a 3rd-party company to increase a proxy or an intermediary between their customer and the WhatsApp server to deliver additional information and facts about the varieties of content material their shopper can receive from the WhatsApp server.

“The challenge right here is that WhatsApp would no longer have immediate link to both equally shoppers and, as a result, would lose connection level indicators that are vital for keeping consumers risk-free from spam and scams this sort of as TCP fingerprints,” Brouwer pointed out.

“This technique also exposes all the chat metadata to the proxy server, which boosts the probability that this info could be unintentionally or intentionally leaked.”

Observed this article intriguing? Observe us on Twitter  and LinkedIn to read much more distinctive content material we write-up.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «secrets sensei: conquering secrets management challenges Secrets Sensei: Conquering Secrets Management Challenges
Next Post: Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets microsoft confirms russian hackers stole source code, some customer secrets»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.