Monday, May 19, 2025
HomeSecurity NewsSkype to add End-to-End Encryption for Audio, Text messages, Images and Videos

Skype to add End-to-End Encryption for Audio, Text messages, Images and Videos

Published on

SIEM as a Service

Follow Us on Google News

Microsoft to add end-to-end encrypted Private Conversations for Audio, Text messages, Images, and videos and now for available for Skype Insiders with Skype version 8.13.76.8.

Skype to use the Industry standard Signal Protocol that developed by Open Whisper Systems in 2013 for end-to-end encryption for voice calls.Any text, video, or image coming from the Android version of Signal is encrypted before it leaves your phone.

Signal combines the Double Ratchet Algorithm, prekeys, and a triple Diffie–Hellman handshake, and uses AES-256, Curve25519, and HMAC-SHA256 as primitives. Prior to Skype, Whatsapp that owned by Facebook, Google Allo, Facebook Messenger integrated with open source Signal Protocol.

- Advertisement - Google News

How to start Private Conversation – Skype

1. Click on the + icon next to New Private Conversation.

2. Select the contact your list and invite to accept your invitation for Private Conversation.

3. Once the invitation accepted you can start the private conversation with the specific device. Note the invitation is valid only for 7 days.

Also Read Private Messenger app Signal Published a New Private Contact Discovery Service

Skype

Now you can test Private conversation by downloading insider version 8.13.76.8, but bear in mind the other person also needs to use skype insider to start the Private conversation.

During the preview, you will only be able to start private conversations with other Skype Insiders also running the latest version, and these interactions are limited to one-to-one conversations. Up next, we’d like to improve the UX around the invite to join a private conversation and bring the experience to the UWP client, says Microsoft.

Now you can participate in private conversation from a single device at a time, you can switch over the device anytime by sending a new private invitation but the received message tied to the device.

Deleting the conversation works same as like the regular chat and to end the private communication select “End Conversation” from chat header.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...