Viber strenghtens security through end-to-end encryption, cryptography keys and hidden chats

Madeleine Dean By: Madeleine Dean
2 minute read

Home » News » Viber strenghtens security through end-to-end encryption, cryptography keys and hidden chats

Viber has given users more control over their private conversations through end-to-end encryption, hidden chats and message deletion. This is excellent news for more than 700 million Viber users who can now communicate more securely on the messaging service.

Thanks to the end-to-end encryption, risk that Viber messages be intercepted  is very low, irrespective of the conversation type or the device people are using – whether it is in a one-to-one or group message, on a call, on desktop, mobile or tablet.

Apart from the end-to-end encryption, an individual cryptography key is associated with the user’s device, offering them an extra layer of security. Users can manually authenticate contacts to select they are “trusted”. Then the lock color will change to green.

A red lock means there is a problem with the authentication key. This can mean that a user has changed his or her primary phone but it can also indicate a man-in-the-middle-attack. If you are sure nothing is wrong, you can simply re-trust the respective participant.

Since many users share tablets with their families or colleagues, Skype has also rolled out Hidden Chats to protect conversations from wandering eyes. This feature allows users to hide specific chats from the main screen and access them only via a PIN code.

Download the latest version of Viber, you will receive a notification when your conversations are encrypted. Viber is rolling out these security features globally over the next two weeks.

These measures definitely make conversations more secure, but won’t make messages completely private. Vulnerabilities still exist and they can be exploited by hackers, irrespective of the VoIP apps for free calls you are using, therefore the best solution is to keep confidential or security sensitive information away from social apps or social media.

Of course, don’t forget to regularly scan your system.




Next up

Top 4 Blu-Ray creator software to create Blu-Ray videos

Daniel Segun By: Daniel Segun
Less than a 1 minute read

Blu-ray is, without doubt, the most powerful video content hub today, which is a marked improvement to the preceding DVD medium. However, its convenience of […]

Continue Reading

How can I recover PowerPoint passwords within minutes?

Daniel Segun By: Daniel Segun
5 minute read

Microsoft PowerPoint presentations usually contain important, sometimes classified, documents. Hence, most people tend to password-protect such documents against unauthorized access. However, what happens if you […]

Continue Reading

5 automated receptionist software for increased productivity

Madhuparna Sukul avatar. By: Madhuparna Sukul
Less than a 1 minute read

The reception desk is the face and voice of any organization. An automated receptionist software simplifies the entire process of visitor management. Whether it’s the customer, […]

Continue Reading