Monday, November 25, 2024
HomeCyber Security NewsElon Musk Said Twitter DMs Should Have End to End Encryption

Elon Musk Said Twitter DMs Should Have End to End Encryption

Published on

Elon Musk, the CEO of SpaceX and Tesla and the new owner of microblogging and social networking giant Twitter intends to add E2EE (end-to-end encryption to the Direct Messages (DM) feature of Twitter.

In reality, Twitter and other social networks play a significant role in social and political discourse and have an increasingly important corollary responsibility to make sure that their decision-making is both transparent and accountable.

Musk believes it is essential to adopt E2EE like Signal to prevent spying or hacking of users’ messages on Twitter.

- Advertisement - SIEM as a Service

Musk tweeted, “Twitter DMs should have end-to-end encryption like Signal, so no one can spy on or hack your messages”.

He also mentioned that the lack of E2EE for Twitter DMs had remained a concern for the Electronic Frontier Foundation/EFF for undermining user safety/privacy because Twitter itself can access it and hand it over to government/law enforcement agencies.

EFF says “Because they are not end-to-end encrypted, Twitter itself has access to them. That means Twitter can hand them over in response to law enforcement requests, they can be leaked, and malicious hackers can abuse internal access and Twitter employees themselves (as has happened in the past)”.

Musk has recently been crucial of anonymous users on the platform, and recommended that Twitter should “authenticate all real humans.” He also spoke about changing the verification process by which accounts get blue checkmarks next to their names to signify they are “verified.”

Botnets and trolls have long presented a problem for Twitter, but requiring users to submit identification to prove that they’re “real” goes against the company’s ethos.

Direct Messages on Twitter

Direct messages on Twitter can be read by you, the user you sent them to, and Twitter itself. Thus they can be leaked, and internal access can be abused by malicious hackers and Twitter employees themselves.

It is safer if the direct messages are protected with end-to-end encryption. Also, it is essential to provide third-party developers, and users, more access to control their experience. This improves the safety and security of users.

Musk’s Plans for Future Enhancement

Musk wanted Twitter to become better and enrich the platform with exemplary new features such as making its algorithms open-source to improve users’ trust, authenticating human users, and defeating spambots.

He also believes that Twitter should offer an Edit button and aims to implement it soon. The change will likely impact all users soon.

Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory says “In total, [end-to-end encryption] for DMs would be a net gain for user privacy and security”.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...