Categories: Cyber Security News

Elon Musk Said Twitter DMs Should Have End to End Encryption

Elon Musk, the CEO of SpaceX and Tesla and the new owner of microblogging and social networking giant Twitter intends to add E2EE (end-to-end encryption to the Direct Messages (DM) feature of Twitter.

In reality, Twitter and other social networks play a significant role in social and political discourse and have an increasingly important corollary responsibility to make sure that their decision-making is both transparent and accountable.

Musk believes it is essential to adopt E2EE like Signal to prevent spying or hacking of users’ messages on Twitter.

Musk tweeted, “Twitter DMs should have end-to-end encryption like Signal, so no one can spy on or hack your messages”.

He also mentioned that the lack of E2EE for Twitter DMs had remained a concern for the Electronic Frontier Foundation/EFF for undermining user safety/privacy because Twitter itself can access it and hand it over to government/law enforcement agencies.

EFF says “Because they are not end-to-end encrypted, Twitter itself has access to them. That means Twitter can hand them over in response to law enforcement requests, they can be leaked, and malicious hackers can abuse internal access and Twitter employees themselves (as has happened in the past)”.

Musk has recently been crucial of anonymous users on the platform, and recommended that Twitter should “authenticate all real humans.” He also spoke about changing the verification process by which accounts get blue checkmarks next to their names to signify they are “verified.”

Botnets and trolls have long presented a problem for Twitter, but requiring users to submit identification to prove that they’re “real” goes against the company’s ethos.

Direct Messages on Twitter

Direct messages on Twitter can be read by you, the user you sent them to, and Twitter itself. Thus they can be leaked, and internal access can be abused by malicious hackers and Twitter employees themselves.

It is safer if the direct messages are protected with end-to-end encryption. Also, it is essential to provide third-party developers, and users, more access to control their experience. This improves the safety and security of users.

Musk’s Plans for Future Enhancement

Musk wanted Twitter to become better and enrich the platform with exemplary new features such as making its algorithms open-source to improve users’ trust, authenticating human users, and defeating spambots.

He also believes that Twitter should offer an Edit button and aims to implement it soon. The change will likely impact all users soon.

Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory says “In total, [end-to-end encryption] for DMs would be a net gain for user privacy and security”.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…

10 hours ago

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…

10 hours ago

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…

10 hours ago

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated…

10 hours ago

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed…

10 hours ago

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored…

10 hours ago