{"id":105,"date":"2023-01-27T18:03:20","date_gmt":"2023-01-28T01:03:20","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=105"},"modified":"2023-01-29T14:37:06","modified_gmt":"2023-01-29T21:37:06","slug":"instant-messaging-applications-cryptography","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2023\/01\/27\/instant-messaging-applications-cryptography\/","title":{"rendered":"Instant Messaging Applications &amp; Cryptography"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"775\" height=\"401\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture2-3.png\" alt=\"\" class=\"wp-image-116 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture2-3.png 775w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture2-3-300x155.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture2-3-768x397.png 768w\" data-sizes=\"(max-width: 775px) 100vw, 775px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 775px; --smush-placeholder-aspect-ratio: 775\/401;\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cCommunication is the essence of human life\u201d<\/p>\n<cite>~Janice Light<sup>[1]<\/sup><\/cite><\/blockquote>\n\n\n\n<p>Instant messaging is a set of technologies that facilitate real-time communication. Also known as I.M., social messengers, messaging apps or chat apps, it is a quick, accessible, and convenient mode of communication. Instant messaging pre-dates the modern internet and has existed since the early 1990s. However, the way we know instant messaging today became famous after 2005 with the introduction of Blackberry Messenger and WhatsApp mobile applications. Eventually, increased internet penetration, improved smartphones and added convenience led to the widespread adoption of these messaging applications resulting in trillions of messages flowing through these platforms annually.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture3-2.png\" alt=\"\" class=\"wp-image-119 lazyload\" width=\"557\" height=\"363\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture3-2.png 743w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture3-2-300x195.png 300w\" data-sizes=\"(max-width: 557px) 100vw, 557px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 557px; --smush-placeholder-aspect-ratio: 557\/363;\" \/><\/figure>\n\n\n\n<p>In 2021, there were 3.8 billion active users on different instant messaging apps, according to Statista <sup>[2]<\/sup>. Gradually, other platforms like Telegram, Signal, Facebook Messenger, and iMessage also emerged and created their own niches. Nowadays more communication takes place on IM platforms than in-person.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security &amp; Privacy in IMs<\/h3>\n\n\n\n<p class=\"has-normal-font-size\">The rapid popularity gains of IM platforms led to all forms of information flowing through them. Given the volume of valuable and confidential data transmitted through the IM platforms, they became suitable channels for threat actors and intruders to gain access to information like never before. Thus, instant messaging platforms are vulnerable to security and privacy risks.<\/p>\n\n\n\n<p class=\"has-normal-font-size\"><br>Although most present-day applications use some form of authentication to control data access on the platform, data confidentiality and integrity during transmission are equally necessary for security and privacy. A combination of cryptographic algorithms solves this riddle of secure message transmission in a real-time environment. However, different sets of cipher offer variable strengths and weaknesses, acting as a key differentiator in the security posture of popular messaging platforms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Classification of Communications over IMs<\/h3>\n\n\n\n<p>Despite all security concerns and issues, instant messaging platforms continue to be used for all forms of communication by users. Particularly, communications over IMs can be classified as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Informal communication with friends and family<\/li>\n\n\n\n<li>Informal communication with colleagues at\/ outside the workplace<\/li>\n\n\n\n<li>Formal communication with colleagues at the workplace<\/li>\n\n\n\n<li>Business communication with prospective\/ existing customers<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"452\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture4-1.png\" alt=\"\" class=\"wp-image-124 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture4-1.png 624w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture4-1-300x217.png 300w\" data-sizes=\"(max-width: 624px) 100vw, 624px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 624px; --smush-placeholder-aspect-ratio: 624\/452;\" \/><\/figure>\n\n\n\n<p>For example, companies are increasingly using services like \u2018WhatsApp for Business\u2019 to connect with customers. It offers features such as a business profile, greeting message, quick replies, and metrics to track engagement. Additionally, these platforms can be used as a live chat solution for customer support and to send promotional messages.<\/p>\n\n\n\n<p><br>However, different scenarios require different levels of sensitivity to security and privacy measures. For example, informal communication with friends and family typically requires fewer security and privacy measures than formal communication with colleagues at the workplace or business communication with customers, as the latter could include sensitive information such as confidential business plans, financial data, and the personal information of customers. Therefore, it is important to be cautious about the information shared and the security and privacy implementation of the instant messaging platform used for sharing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security &amp; Privacy implementation in IMs<\/h3>\n\n\n\n<p>Instant messaging platforms use diverse measures to protect users&#8217; data. It includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>End-to-end encryption:<\/strong> This method encrypts messages on the sender&#8217;s device, which can be decrypted only on the recipient&#8217;s device. It ensures that even if a message is intercepted in transit, it would be unreadable to anyone other than the intended recipient, including the IM platform itself.<\/li>\n\n\n\n<li><strong>Authentication:<\/strong> Most instant messaging platforms require users to create an account and log in to use the service. It ensures that only authorized users can access the platform and send messages.<\/li>\n\n\n\n<li><strong>Device and account linking:<\/strong> Many instant messaging platforms allow users to link their accounts to multiple devices, such as smartphones and tablets. Thus, the platform can detect if an account is accessed from an unknown device and alert the user.<\/li>\n\n\n\n<li><strong>Backup and recovery options:<\/strong> Many instant messaging platforms allow users to back up their messages and settings so that they can be recovered in case of loss or theft of the device.<\/li>\n\n\n\n<li><strong>Two-factor authentication:<\/strong> This is an additional layer of security that requires users to provide a code sent to their mobile phone or email address in addition to their password to log in.<\/li>\n\n\n\n<li><strong>Regular security updates:<\/strong> Instant messaging platforms often release regular security updates to fix potential vulnerabilities and ensure the protection of users&#8217; data.<\/li>\n\n\n\n<li><strong>Legal compliance: <\/strong>Instant messaging platforms may be required to comply with legal requests for information from law enforcement agencies. While these platforms may provide information to law enforcement agencies, they also inform the user in case of any legal request for their information.<\/li>\n<\/ul>\n\n\n\n<p>However, it&#8217;s important to note that the privacy and security measures taken by different instant messaging platforms may vary, which means that different platforms may have different levels of security based on their implementation and effectiveness. Thus, they may be susceptible to different attacks and breaches.<br><\/p>\n\n\n\n<p>One such security incident was reported in 2016, when a popular instant messaging platform \u2018Telegram\u2019 was compromised by a group of hackers from Iran, leaking 15 million phone numbers of Iranian users.<sup>[3]<\/sup><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>In conclusion, instant messaging has become an integral part of our daily lives, revolutionizing the way we communicate. With its real-time nature and advanced features, it has surpassed traditional forms of communication like SMS and email. But, with the increased usage of IMs, security and privacy concerns have also risen. Users must be aware of these risks and take necessary precautions to safeguard their personal and professional information. Despite these concerns, IMs continue to be used for all forms of communication, from personal to professional use cases. Companies are also adopting IMs for business communication, using services like WhatsApp for business to connect with customers. It is essential to be aware of potential security and privacy risks associated with each IM, while also being aware that no platform can guarantee complete protection.<\/p>\n\n\n\n<p><strong>Group 5:<\/strong> Abhishek Jain, Anubhav Swami, Ayushi Gandhi and Nikhil Nettar.<\/p>\n\n\n\n<p><strong>PS:<\/strong> Please take the survey in the first comment and share your comments.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading\">References:<\/h4>\n\n\n\n<p style=\"font-size:18px\"><sup>[1]<\/sup>Light, Janice. \u201c\u2018Communication Is the Essence of Human Life\u2019: Reflections on Communicative Competence.\u201d Augmentative and Alternative Communication, vol. 13, no. 2, Jan. 1997, pp. 61\u201370. Taylor and Francis+NEJM, https:\/\/doi.org\/10.1080\/07434619712331277848.<\/p>\n\n\n\n<p style=\"font-size:18px\"><sup>[2]<\/sup>\u201cMost Popular Messaging Apps 2022.\u201d Statista, https:\/\/www.statista.com\/statistics\/258749\/most-popular-global-mobile-messenger-apps\/. Accessed 27 Jan. 2023.<\/p>\n\n\n\n<p style=\"font-size:18px\"><sup>[3]<\/sup>\u201cExclusive: Hackers Accessed Telegram Messaging Accounts in Iran &#8211; Researchers.\u201d Reuters, 2 Aug. 2016. www.reuters.com, https:\/\/www.reuters.com\/article\/us-iran-cyber-telegram-exclusive-idUSKCN10D1AM.<\/p>\n\n\n\n<p style=\"font-size:18px\"><sup>[4]<\/sup>What Is Instant Messaging? www.youtube.com, https:\/\/www.youtube.com\/watch?v=AtP874lpenI. Accessed 27 Jan. 2023.<\/p>\n\n\n\n<p style=\"font-size:18px\"><sup>[5]<\/sup>\u201cChat Systems.\u201d Xkcd, https:\/\/xkcd.com\/1810\/. Accessed 27 Jan. 2023.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cCommunication is the essence of human life\u201d ~Janice Light[1] Instant messaging is a set of technologies that facilitate real-time communication. Also known as I.M., social messengers, messaging apps or chat apps, it is a quick, accessible, and convenient mode of communication. Instant messaging pre-dates the modern internet and has existed since the early 1990s. However, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2023\/01\/27\/instant-messaging-applications-cryptography\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Instant Messaging Applications &amp; Cryptography&#8221;<\/span><\/a><\/p>\n","protected":false},"author":570,"featured_media":107,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture1-600x400.jpg","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Picture1-600x490.jpg","author_info":{"display_name":"ABHISHEK JAIN","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/abhishek-jain\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/570"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":13,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"predecessor-version":[{"id":159,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/105\/revisions\/159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/107"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}