Thursday, January 21, 12:51
Home investigations EPS - EL.AS: Truths or Exaggerations about message tracking?

ΕΥΠ - ΕΛ.ΑΣ: Truths or Exaggerations about monitoring messages?

At the initiative of Vasili Koufa, a reader of SecNews, we received an official response from Viber regarding the rumors that claim that the conversations on the messaging platform will now be monitored by the Greek Authorities (EYP - EL.AS).

Concerns among Greek users about the monitoring of top communications applications, including Viber and WhatsApp, by EYP and ELAS.


Those of you who do not know this news, We inform you that at the end of October a group of EYS executives went to England where they appeared to be watching a demonstration of an expensive surveillance system, with similar interest from ELAS services such as the Directorate of Information Management and the Counter-Terrorism Service.

The supply of these systems, which has been considered a top priority by security authorities and intelligence services, is expected to change the data on criminal disruption investigations that use 70-80% of such online applications to communicate with them.

The user feedback storm through a comment stream on SOCIAL MEDIA seems to have disturbed her colossus online contact who rushed to respond to rumors and restore his name messaging app.

Today, Viber has officially responded to how it processes and manages its user data.

The screenshot shows the company's response to a SecNews reader.


"With version 6.0, Viber has end-to-end encryption offering secure communication through voice messages, video chats, text messages, videos and images.

This means that your personal data is encrypted as soon as it is sent from your device to the recipient's device. Encryption is essentially the conversion of your message into code, the key of which only you and the recipients of your message will have. No one else, not even Viber does not have the secret key. "


What is This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. end-to-end encryption;

Messaging apps that use End-to-end Encryption are considered the most inaccessible applications that can very difficult violate a hacker. What does this mean; The data is stored in endpoints (ie by users rather than servers) and companies do not maintain the data nor can they decrypt it with a master key.

EYP- EL.AS what are they trying to accomplish?

When Viber promises end-to-end encryption how the EYS and ELAS. will they succeed in tracking users? Deals behind closed doors or inaccuracies and exaggerations for citizens to scare? What will be the users' trust - if rumors are true - about the services that protect users from electronic crime when, in the end, do they themselves adopt it? Whether justified or not, this loss has definitely put us in the thoughts, so we should always take care to protect our "online selves".

  1. We always use strong passwords
  2. We choose not to expose important personal information to social media
  3. We avoid online communication with users we do not know as they may be in violation of our accounts
  4. Often security updates of our appliances


If you need more information about the platform's privacy policy and end-to-end encryption, you can go to the following links:



* SecNews has also contacted the WhatsApp DPO and is awaiting a formal response.

* SecNews thanks Vasili Koufa for his interest and cooperation.


  1. Since the issue is very serious, let's look at what each application is.
    Viber - closed code, so it's good to have reservations….
    Whatsap - open source ONLY the encryption (it has the encryption of the signal) but the rest is closed and among other things, belongs to facebook, which alone is a joke about privacy….
    The only ones that I find most secure are Signal, Wire, Tox (Antox, Qtox, etc.) even though it still has a lot of bugs.
    If I make a mistake somewhere I am happy to correct me…

  2. How can the end-to-end company claim it all, when you send a video to a friend and tell you that the video was sent, and while his phone is off, he receives it hours later.
    Of course EVERYTHING is stored on THEIR servers and there is no conversation between 2…

  3. What I have long understood by reading and analyzing the news and what can be practically exploited, I conclude that the hardware / software acquired will be able to collect metadata for those monitored and practically not breaking end-to-end encryption. For this, in a detailed report there was also a reference to spyware Pegasus developed by the Israeli NSO Group, which if acquired can exploit application / ecosystem vulnerabilities and be able to monitor the device and its contents after exploit. Last but not least, with cloud backup there is a high risk that personal data will be exposed either because it is unencrypted and will be able to access unauthorized third parties or may be exposed to SIM hijacking attacks.

  4. Ti lete re anidei apoti thimame epidi to eida to sinedrio oi tipi espasan tin RSA 2048 kai oxi mono mesa se 1 lepto apta public key gia ta private an thimame kala gia to otan pige i eip ekei kai malakies kai auto logo enos kodosika pou iparxi ed kai 40 xronia i poso einai me mia alagi patchaki tron!
    Siga mi perimena kai kanena na paei les kai den eixan 200 prime numbers gia tin AES edw kai xronia .. LOL !!!!
    Dieresi gia ton monadiko arithmo mproo !!

    • An de kano lathos etsi kialios giauto kai gia to brute force fobounte oloi ta quantum computer kai gineste thimata tis mazas! To encryption prokite na se prostatepsi or kanena exploit, overflow, userafterfree, pou einai apira etsi kialios kai edw kai posa xronia ta hack_bugs einai peripou 20k ton xrono. Kai skepsou oti eisai kai end to end paneukolo na se broun an se stoxeusoun !!
      Mazi mauto esli na pw oti de eimai PRO stin kriptografisi alla auta kserw kai giauto ta egrapsa !!!
      Kai auto pou ennoousa gia ton alithi arithmo an de kanw lathos einai oti auti i arithmi anigoun ola ta encrypted bit mexri 200 me basi auto pou lew lew. Mporei na kanw lathos sauto kai pite mou alla okay.
      Auto pou lew einai oti einai enas arithmos pou otan dierethi me ton eauto tou bgazi ton monadiko arithmo.
      Kai malon kapos etsi got ekanan kai to brute force auti etsi kialios giati parousiasi kai PoC ediksan stous skatoleftades ekei kai kapies leptomeries !!!

      ~ An thelete alagi kinigiste tin !!! Never Get IT WRONG!


Please enter your comment!
Please enter your name here


US: Twitter locks Chinese embassy account due to "dehumanization"

Twitter said it locked the account of the Chinese embassy in the United States for a tweet about its women ...

Ransomware victims pay a ransom to prevent their data from being leaked

Keeping backups is very important, especially in cases of Ransomware attacks. However, it seems that the hackers are using new methods, with ...

QAnon fans: Disappointed on social media after Biden was sworn in

Some QAnon supporters have expressed frustration at online forums and chat rooms over Joe Biden's swearing-in. Most...

COVID-19: Amazon wants to help Biden distribute the vaccines

Amazon has offered to help President Biden distribute COVID-19 vaccines. The letter from Dave Clark, vice president ...

Nitro PDF: Leaked database with 77 million user files!

Hacker leaked on January 20 a stolen database containing email addresses, names and passwords for over ...

Hackers provide free online 2 million Pixlr user files!

Hackers have leaked 2 million Pixlr user files containing information that could then be used to execute ...

Donald Trump: Thanks to Lil Wayne, not to Julian Assange!

Outgoing US President Donald Trump will award today thanks to rapper Lil Wayne in a final wave of pardon that ...

NASA: Uses AI to locate new craters on Mars Τα τελευταία 15 χρόνια, το Mars Reconnaissance Orbiter της NASA περιφέρεται γύρω από τον Άρη μελετώντας...

Windows 10: How to view recently installed updates

Microsoft frequently updates Windows 10, but it is not always clear when each update is installed. Fortunately, there are two easy ways ...

Lorex launches a bell with a 2K camera that detects faces

Lorex launches a new device for smart homes - the bell called "2K QHD Wired Video Doorbell with Person ...