📜 ⬆️ ⬇️

Computer user corner: the secret of correspondence

The WhatsApp application, being the most common “rewriting” in the world, is inferior in terms of security and functionality to other similar systems, in particular Telegram and Signal.

image

One of the most important differences between Telegram and Signal (previously existing on Android in the form of two separate applications - RedPhone and TextSecure), until recently, was support for end-to-end encryption. End-to-end encryption differs from non-through encryption in that in the second case the data is decrypted on the server when received from the sender and again encrypted, sent to the recipient, with the pass-through the same data remains encrypted along its entire path. The disadvantage of end-to-end encryption is the fact that text messages transmitted in this way have not yet been able to synchronize to other devices of the user, although this problem has been successfully solved in iMessage . The April 5 WhatsApp update tweaked all three services: WhatsApp implemented end-to-end encryption for all messages and audio calls using the Signal protocol .

Telegram functionality, extending its area of ​​application beyond text messaging, along with the possibility of end-to-end encryption, make this system the most attractive for a wide range of computer users. However, while the Signal encryption protocol is not satisfactory , Telegram leaves much to be desired . However, both applications meet all of the safety criteria put forward by the Electronic Frontier Foundation. A distinctive feature of the work of end-to-end encryption with Signal and WhatsApp (as with iMessage) is that sending messages does not need to wait for a user to whom they are addressed to appear on the network.
')
Centralization and attachment to a phone number with all the ensuing consequences are the drawbacks of all three systems, however, in the case of Signal, registration is possible not only with a mobile phone number, but also with a landline phone number, Google Voice or VoIP . They are deprived of the promising Tox , by which you can also make video calls, and the already recognized XMPP protocol , which, in conjunction with OTR, is another recognized encryption standard. However, the applications working on them are not convenient enough to use at the present time in order to be widely distributed among non-advanced computer users, that is, most, and for this reason are not included in the table.

image

Notes to the table:


Update 19/04: Changed the table and text in accordance with the update in WhatsApp encryption technology

See also:
Computer user corner: melatonin and screens
Computer User Corner: Civic Activism

Source: https://habr.com/ru/post/391195/


All Articles