{"id":7875,"date":"2017-02-08T07:00:02","date_gmt":"2017-02-08T12:00:02","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=7875"},"modified":"2018-07-28T14:08:59","modified_gmt":"2018-07-28T18:08:59","slug":"messaging-apps-use-end-end-encryption","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/messaging-apps-use-end-end-encryption\/","title":{"rendered":"Messaging Apps That Use End-to-End Encryption"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">End-to-end encryption is a relatively new feature for messaging apps. Unfortunately, your data is a lot more insecure than you may realize. Without end-to-end encryption, your messages could be accessed by someone other than the recipient. With end-to-end encryption, only you and the recipient can see every message. That means that no one can intercept your messages: not even the maker of the service, an intelligence agency, or a hacker. This feature is an incredible accomplishment for those who want their digital communication to be private.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to end-to-end encryption, consider locking your messaging apps \u2014 and other private apps \u2014 with an app password. This will help to protect your data in case your phone falls into the wrong hands. Click here to add a password to your apps:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/vault\" rel=\"attachment wp-att-7755\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7755\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/deeplink_vault.png\" alt=\"deeplink_vault\" width=\"300\" height=\"78\" \/><\/a><\/center><b>WhatsApp<br \/>\n<\/b><span style=\"font-weight: 400;\">This messaging app made news last year with its impressive feat: end-to-end encryption as the default, for everything in the app. That means that every message, video, file, voice message, and photo you send, and every call you make, has end-to-end encryption. If you\u2019re using the latest version of the app, then end-to-end encryption is already enabled \u2014 there\u2019s nothing else you have to do.<\/span><\/p>\n<p><b>Facebook Messenger<br \/>\n<\/b><span style=\"font-weight: 400;\">This app isn\u2019t fully encrypted in the way that WhatsApp is, but it now offers \u201cSecret Conversations\u201d which are end-to-end encrypted. As stated, no one can intercept your messages when sent in a secret conversation. Further, taking a cue from Snapchat and Signal, you can set your secret messages to self-destruct after a certain period of time, once the recipient has seen the message. If you\u2019re using the current version of Messenger, you can access secret messages by creating a new message and then clicking \u201csecret\u201d in the top right corner.<\/span><\/p>\n<p><b>Signal<br \/>\n<\/b><span style=\"font-weight: 400;\">In addition to WhatsApp, Signal is one of the best messaging apps for end-to-end encryption. It was created by Open Whisper Systems \u2014 the same software organization that helped to encrypt WhatsApp. It\u2019s a free app that allows you to send and receive high-quality, encrypted messages (group, text, photo, video, etc.). Like Messenger, you can also set messages to self-destruct after a period of time. It\u2019s one of the best apps on the market if you\u2019re looking for a truly secure messaging app.<\/span><\/p>\n<p><b>Viber<br \/>\n<\/b><span style=\"font-weight: 400;\">This popular messaging app also offers end-to-end encryption. Unlike the other messaging services mentioned, Viber users a color-coded feature to show you how secure your conversations are. While this app is also free to use, if you want to contact non-Viber users, you\u2019ll have to pay a fee.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may have already heard that WhatsApp is now offering end-to-end encryption. But there are many more messaging apps that have this feature, too.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-7875","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=7875"}],"version-history":[{"count":1,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7875\/revisions"}],"predecessor-version":[{"id":19217,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7875\/revisions\/19217"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=7875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=7875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=7875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}