Sunday, December 8, 2024
HomeComputer SecuritySignal Introduces New Sender Anonymity Feature that Shield Sender Identity

Signal Introduces New Sender Anonymity Feature that Shield Sender Identity

Published on

SIEM as a Service

The signal is an encrypted communication app, using signal you can communicate with your easily and securely. It is the most scalable encryption tool that encrypts any text, video, or image before it leaves your phone.

Now to avoid further information disclosure Signal comes up with Sealed sender feature that hides the sender information outside of the package.

With the traditional Email encryption system, the server cannot read the encrypted content but uses the information outside of the package to deliver the message between users.

- Advertisement - SIEM as a Service

“While the service always needs to know where a message should be delivered, ideally it shouldn’t need to know who the sender is. It would be better if the service could handle packages where only the destination is written on the outside, with a blank space where the “from” address used to be.”

How the New Sealed Sender Feature Will Work

The service aims to validate the sender’s identity to prevent spoofed messages and provide assurance for the receivers bout who sent the message.

  • When the user sends the message will be encrypted as usual with Signal protocol.
  • It includes a sender certificate in the envelope and encrypts the envelope of the receipt.
  • Without authentication, the encrypted envelop sent along with the recipient’s delivery token.
  • The message recipient only can decrypt it and validate the envelope matches the sender certificate.

Users can enable an optional setting that allows them to receive incoming “sealed sender” messages from non-contacts and people with whom they haven’t shared their profile or delivery token.

Sealed sender

The setting can be enabled from Settings >> Sealed Sender >> Allow from Anyone. The feature included with the latest beta release, as like before the Message contents are end-to-end encrypted, along with that they start envelope the sender information.

“Our beta releases are not for the faint of heart. If you need a stable and reliable messaging experience, we strongly encourage you to wait.” reads the signal blog post.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...