Friday, February 21, 2025
HomeAndroidWhatsApp New Privacy Feature Let Users Hide Location During Calls

WhatsApp New Privacy Feature Let Users Hide Location During Calls

Published on

SIEM as a Service

Follow Us on Google News

WhatsApp has begun to roll out the ‘Protect IP Address in Calls’ feature, which conceals your IP address during calls.

Upon using this feature, all your calls will be relayed through WhatsApp’s servers, protecting your IP address and preventing other callers from figuring out your geographical location.

These features reduce the impact of real-world attacks while respecting and enhancing user privacy.

‘Silence Unknown Callers’ is another privacy feature WhatsApp announced in June 2023. Once activated, calls from unknown numbers stop ringing on your phone.

This feature protects users from unknown contact, cyberattacks, and spyware by reducing the attack surface and external data processing.

Protect IP Address During Calls

Peer-to-peer and relay-based connections are the two most popular ways of connecting call participants.

Peer-to-peer connections are present in most calling products used by users today. Faster data transfers and higher call quality are made possible by this direct connection, but it also implies that for all data packets to be delivered to the right device, participants must be aware of each other’s IP addresses.

Both callers may see each other’s IP addresses in a one-to-one conversation. IP addresses may contain information that some of our most privacy-conscious users are aware of, such as a wide geographical area or internet provider.

Diagram of a relay serverDescription automatically generated
Peer-to-peer and via a relay connection

In response to this concern, WhatsApp released the “Protect IP Address During Calls” feature that lets you hide your IP address during calls.

Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

“We introduced a new feature on WhatsApp that allows you to protect your IP address during calls,” WhatsApp said.

Protect IP address

“With this feature enabled, all your calls will be relayed through WhatsApp’s servers, ensuring that other parties in the call cannot see your IP address and subsequently deduce your general geographical location.”

This new feature adds another degree of protection and privacy. WhatsApp doesn’t have the ability to listen in on your calls because, as usual, all your calls are encrypted end-to-end. This includes calls that are relayed through its servers.

How to Activate it?

To access this setting:

  • Tap Settings, then Privacy.
  • Tap Advanced.
  • Turn Protect IP address in calls on or off.

This year, WhatsApp developed and released “Silence Unknown Callers” and “Protect IP Address in Calls” as part of our continuous, all-encompassing efforts to keep users safe.  In addition to numerous other safeguards, these additional security features help to keep users safe on WhatsApp.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...