Twitter has secret encryption feature on its Android app?

Wouldn’t it be great if Twitter had a feature that allowed users to send encrypted direct messages? That would turn the app into a place where you could send private messages without fear of the content being discovered, and put Twitter into a class with WhatsApp and Telegram. Wait a second, Twitter does have such a feature secretly cooked inside its Android app. It was found inside the Twitter for Android APK by Jane Manchun Wong (@wongmjane), a computer science student who has discovered unreleased features on Instagram.

We don’t know when or if Twitter will unleash this beast of a feature, …

Comey's "A Higher Loyalty" mentions his distaste for encryption; cites Apple, 'Silicon Valley types'

We’ve all seen the headlines and know that former FBI Director James Comey’s book, “A Higher Loyalty,” is full of salacious tales about President Donald J. Trump. But putting aside subject matter like “golden showers” for a moment, Comey’s book tears into more than just the president. You might recall that Comey himself was in the middle of Apple’s little brouhaha with the Justice Department over the G-Men’s attempt to crack the San Bernardino shooter’s Apple iPhone 5c. As a result, the ex-FBI director discusses Apple, Silicon Valley and encryption in his tome.

The Justice Department won …

Skype adds end-to-end encryption to its messaging app via Private Conversations

Microsoft and Signal have teamed up to make Skype conversations as private as possible. The messaging service will soon benefit from end-to-end encryption, something that its rivals, WhatsApp and Messenger already offer for quite some time.

End-to-end encryption will be available for Skype users in the form of Private Conversations, a new feature that’s now being tested by Skype Insiders. According to Microsoft, the new feature is not supported in groups, so you’ll only be able to use when communicated with one other person. Here is how it works:

Tap …

Keep all your Emails Private with Blackberry PGP Encryption

Well, if you think that while sending an email over the network, it will be protected from the unauthorized access, then it is just a misconception that you need to clear as soon as possible. Whenever you send an email to any of your friends or colleagues, there is no such magical wand that will stop the miscreants from stealing the important information over the network. These days, internet is neither secure nor private so, if you are relying on this source without any protection key, then it’s only you who will be responsible for the future consequences.

Hence, if you want to avoid any such future consequence, you must find an appropriate solution to your main queries i.e. how you can protect your emails on the server? Is your cell phone an appropriate gadget to send your confidential data over the network? Only after understanding the possible measure that can help you in securing your data, you will be able to take the further steps. So, if you are still confused about the answers of these questions, then let me help you with all the important information that will give you a clear idea about what it is actually.

When you send an email to your friend or any colleagues, it message saved in it is handled by the SMTP which is called as the simple mail transfer protocol. In the next step when you click on the send button, this SMTP served creates a link with the incoming POP3 server i.e. Post Office Protocol that verifies the recipients email address and it exists; the message is dropped in to the targeted mail box. In this entire process there is not protection key that will protect your message from being read out by any unwanted person. You mail could be easily interpreted by anyone at any time.

In some cases, the message can even get delivered in a wrong inbox thus changing your private email into a general one. Your private data can get exposed top some unwanted sources thus creating serious consequences in future.

Hence, if you don’t want any such risk with your work, you can follow some possible measures that will help you to protect your email from the data mining. You can use the Blackberry PGP Encryption which is an effective application and is helping numerous officials in protecting the data from unauthorized access.

This application helps in creating a public as we’ll as private key. The public key is created first and after this, the private one is generated to keep that at a safe place and is known to the user only who has installed Blackberry PGP Encryption on his gadget.

This is the only process that can encrypt your messages and decrypt the same before displaying the content on the recipients screen. Hence, those who are interested with this pretty good privacy system can search for the online resources which provide this application to their clients.

Secure your blackberry phones with PGP/PTP an advanced encryption method in which no one can read your information except the recipient.Browse our site for more information:

More BlackBerry Future Articles

7 criteria for data encryption

Encrypting data provides a critical, last stand for protecting information that becomes compromised. However, improperly implemented strategies can actually create additional vulnerabilities.


To ensure adequate protection, we recommend following these seven criteria for encrypting data:

1. Know your encryption options

The basic options for encrypting data are FTPS, SFTP and HTTPS. FTPS is the fastest, however, it is more complex with both implicit and explicit modes and high requirements for data port availability. On the other hand, SFTP only requires one port for encryption. HTTPS is often used to secure interactive, human transfers from web interfaces. While all three methods are routinely deployed to encrypt data and protect it from being snipped as it traverses the Internet, it is important to choose the method that best suits your specific needs.

2. Always encrypt data at rest

Most people focus on securing data during a transfer, however, it is critical that data at rest also be encrypted. Data exchange files are especially vulnerable as they are stored in an easily parsable, consumable format. And, web-based file transfer servers are attacked more than their securer, on premise counterparts.

3. …especially with data that may be accessed by or shared with third parties

When a company shares a file with another company, they are typically channeling a storage vendor that automatically encrypts it and authenticates the receiver prior to granting access. However, there will be times when a non-authenticated party needs a file. Companies need a strategy for managing these “exceptions” while data is in motion and at rest.

4. Pretty Good Privacy (PGP) alone is not good enough to manage file security

Most organizations have a PGP policy in place to ensure that uploaded files are encrypted in such a way that the receiver does not need an advanced degree to open it. At the first sign of trouble, these people tend to share their login information in order to get help from a more tech-savvy “friend.” There is also the possibility that the system will break and leave files unencrypted and exposed. PGP policies are a start, but not an all-encompassing solution.

5. It’s less about the type of encryption and more about how it’s executed

Regardless of encryption methodology, companies need to ensure that encryption and security protocols are seamlessly implemented across the board. If they are too difficult and leave too many exceptions, there is a greater chance that an unencrypted file will somehow become available in a public or less secure domain. Clearly defined workflows and tight key management– along with tools for simplifying the process – will go a long way to ensuring that all employees, customers, partners and vendors comply on a daily basis.

6. Establish and protect data integrity

Validating an unbroken chain of command for any and all transfers will further protect important data. There are a variety of methods – manual checksums, PGP signature review, SHA-1 hash functions – and tools for determining if the data has be accessed or corrupted in the process. Maintaining comprehensive user activity logs will help administrators accurately audit systems if there is any uncertainty.

7. Fortify access control

In most FTP implementations, once someone gets past the first layer of security they then have access to all the files on that server. Therefore, administrators must go beyond rudimentary access control and authentication to regulate who can access what. Validating that the authentication process itself is robust is the first step. Implementing a strong password management and lock-out protocols is critical as well.

Adhering to these best-practice recommendations will help ensure that confidential data stands a chance of remaining confidential even if it ends up in the wrong hands.