Tuesday, October 20, 09:08
Home investigations EPS - EL.AS: Truths or Exaggerations about message tracking?

EPS - EL.AS: Truths or Exaggerations about message tracking?

At the initiative of Vasili Koufa, a SecNews reader, we have received a formal response from Viber regarding rumors claiming that the conversations on the messaging platform will now be monitored by the Greek authorities (EYP - ELAS).

Concerns among Greek users about the monitoring of top communications applications, including Viber and WhatsApp, by EYP and ELAS.

EYP

Those of you who do not know this news, We inform you that at the end of October a group of EYS executives went to England where they appeared to be watching a demonstration of an expensive surveillance system, with similar interest from ELAS services such as the Directorate of Information Management and the Counter-Terrorism Service.

The supply of these systems, which has been considered a top priority by security authorities and intelligence services, is expected to change the data on criminal disruption investigations that use 70-80% of such online applications to communicate with them.

The user feedback storm through a comment stream on SOCIAL MEDIA seems to have disturbed her colossus online contact who rushed to respond to rumors and restore his name messaging app.

Today, Viber has officially responded to how it processes and manages its user data.

The screenshot shows the company's response to a SecNews reader.

EL.AS

"With version 6.0, Viber has end-to-end encryption offering secure communication through voice messages, video chats, text messages, videos and images.

This means that your personal data is encrypted as soon as it is sent from your device to the recipient's device. Encryption is essentially the conversion of your message into code, the key of which only you and the recipients of your message will have. No one else, not even Viber does not have the secret key. "

EL.AS

What is This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. end-to-end encryption;

Messaging apps that use End-to-end Encryption are considered the most inaccessible applications that can very difficult violate a hacker. What does this mean; The data is stored in endpoints (ie by users rather than servers) and companies do not maintain the data nor can they decrypt it with a master key.

EYP- EL.AS what are they trying to accomplish?

When Viber promises end-to-end encryption how the EYS and ELAS. will they succeed in tracking users? Deals behind closed doors or inaccuracies and exaggerations for citizens to scare? What will be the users' trust - if rumors are true - about the services that protect users from electronic crime when, in the end, do they themselves adopt it? Whether justified or not, this loss has definitely put us in the thoughts, so we should always take care to protect our "online selves".

  1. We always use strong passwords
  2. We choose not to expose important personal information to social media
  3. We avoid online communication with users we do not know as they may be in violation of our accounts
  4. Often security updates of our appliances

EYP

If you need more information about the platform's privacy policy and end-to-end encryption, you can go to the following links:

https://support.viber.com/customer/portal/articles/2017401-viber-security-faq

https://www.viber.com/app/uploads/Viber-Encryption-Overview.pdf

* SecNews has also contacted the WhatsApp DPO and is awaiting a formal response.

* SecNews thanks Vasili Koufa for his interest and cooperation.

8 COMMENTS

  1. Since the issue is very serious, let's look at what each application is.
    Viber - lock code, so it's good to keep reservations ....
    Whatsap - open source code ONLY the encryption (has the encryption of the signal) but the rest is closed and anyway, belongs to facebook, which itself is an anecdote for privacy….
    The only ones that I find most secure are Signal, Wire, Tox (Antox, Qtox, etc.) even though it still has a lot of bugs.
    If I do something wrong, please correct me ...

  2. How can the end-to-end company claim it all, when you send a video to a friend and tell you that the video was sent, and while his phone is off, he receives it hours later.
    Of course ALL are stored on their servers and there are no conversations between 2 ...

  3. What I have long understood by reading and analyzing the news and what can be practically exploited, I conclude that the hardware / software acquired will be able to collect metadata for those monitored and practically not breaking end-to-end encryption. For this, in a detailed report there was also a reference to spyware Pegasus developed by the Israeli NSO Group, which if acquired can exploit application / ecosystem vulnerabilities and be able to monitor the device and its contents after exploit. Last but not least, with cloud backup there is a high risk that personal data will be exposed either because it is unencrypted and will be able to access unauthorized third parties or may be exposed to SIM hijacking attacks.

  4. Ti lete re anidei apoti thimame epidi to eida to sinedrio oi tipi espasan tin RSA 2048 kai oxi mono mesa se 1 lepto apta public key gia ta private an thimame kala gia to otan pige i eip ekei kai malakies kai auto logo enos kodosika pou iparxi ed kai 40 xronia i poso einai me mia alagi patchaki tron!
    Siga mi perimena kai kanena na paei les kai den eixan 200 prime numbers gia tin AES edw kai xronia .. LOL !!!!
    Dieresi gia ton monadiko arithmo mproo !!

    • An de kano lathos etsi kialios giauto kai gia to brute force fobounte oloi ta quantum computer kai gineste thimata tis mazas! To encryption prokite na se prostatepsi or kanena exploit, overflow, userafterfree, pou einai apira etsi kialios kai edw kai posa xronia ta hack_bugs einai peripou 20k ton xrono. Kai skepsou oti eisai kai end to end paneukolo na se broun an se stoxeusoun !!
      Mazi mauto esli na pw oti de eimai PRO stin kriptografisi alla auta kserw kai giauto ta egrapsa !!!
      Kai auto pou ennoousa gia ton alithi arithmo an de kanw lathos einai oti auti i arithmi anigoun ola ta encrypted bit mexri 200 me basi auto pou lew lew. Mporei na kanw lathos sauto kai pite mou alla okay.
      Auto pou lew einai oti einai enas arithmos pou otan dierethi me ton eauto tou bgazi ton monadiko arithmo.
      Kai malon kapos etsi got ekanan kai to brute force auti etsi kialios giati parousiasi kai PoC ediksan stous skatoleftades ekei kai kapies leptomeries !!!

      ~ An thelete alagi kinigiste tin !!! Never Get IT WRONG!

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

Instagram: Investigated by the EU for child data protection

Instagram is under investigation by the EU, as it allegedly failed to ensure the protection of children's data on its platform ....

Ransomware attack "cost" $ 300.000 in Mississippi schools!

A Mississippi school district voted to pay $ 300.000 to recover files encrypted during an ransomware attack. A...

Russian hackers were planning attacks at the Tokyo Olympics!

The UK government said yesterday that Russian hackers were preparing cyber-attacks against the organizers of the Olympic and Paralympic Games ...

Windows 10: Microsoft has released a new task manager for gamers

If your computer games are slow or slow, you can free up resources in Windows 10 using the new task manager ...
00:01:51

NASA's Osiris-Rex is expected to land on the asteroid Bennu tomorrow

NASA's Osiris-Rex spacecraft will land on a large asteroid for a while on Tuesday and will collect some rocks and ...

How to turn off all vibrations on your iPhone completely

Some people are particularly sensitive to the vibrations of their iPhone, either for personal or medical reasons. Thanks to...

How to convert Keynote presentations to Microsoft PowerPoint

Apple presentation software does all the hard work when converting a PowerPoint presentation to Keynote. Doing the opposite, ...

QAnon Conspiracy Theories: YouTube removes them from the platform

YouTube is the latest social networking site to launch a campaign against the spread of QAnon conspiracy theories.

Vizom: New malware hijacks bank accounts

Vizom disguises itself as a popular "videoconferencing software", with meetings all online due to the pandemic. Investigators...

The Windows 10 Calculator has been ported to Linux

The Windows 10 Calculator has been ported to Linux and can be installed from the Canonical Snap Store. The ...