{"id":3689,"date":"2014-04-16T10:53:24","date_gmt":"2014-04-16T14:53:24","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=3689"},"modified":"2020-02-26T15:09:03","modified_gmt":"2020-02-26T15:09:03","slug":"cryptomessaging","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/cryptomessaging\/3689\/","title":{"rendered":"Safe Internet messaging: a fiction?"},"content":{"rendered":"<p>Hardly are there any folks around who do not use Internet messaging. Just WhatsApp alone is installed on hundreds of millions of devices worldwide and processes a total of tens of billions of messages daily. Don\u2019t forget about Skype, Viber, ICQ, and about a dozen other less popular messengers, including built-in messaging capabilities in Facebook, LinkedIn, and alike. However, with instant messaging services enjoying such popularity, an issue of <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/do-people-need-online-privacy\/\" target=\"_blank\" rel=\"noopener noreferrer\">privacy<\/a> of message exchange comes to light. This extra cautiousness may seem absurd, provided how much information we readily share on the Internet daily, but there are cases when the correspondence has to be totally, entirely private without any possibility of any third party breaching in. Can we communicate online in such a manner that nobody would smell a Snowden? Let\u2019s have a look.<\/p>\n<p><strong>Prologue<\/strong><\/p>\n<p>To approach this issue with a shorter pole, we must consider the ways a message chain or voice communication can get exposed to a third party. The options are not that many. Any message of whatever nature, including text, video, photo, or voice, is, firstly, recorded on local storage volumes on the sender\u2019s and recipient\u2019s systems; secondly, transferred via wired or wireless networks; and, thirdly, is processed by the service\u2019s server (well, not obligatory). And if one can, to some extent, control the access to the messaging history in the first case, the rest of the path the message travels is completely out of control. Surely, <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/encrypt-your-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">encryption<\/a> can save the day, but it is not completely fool-proof: who can guarantee that the protocol, especially if it uses a common encryption algorithm, is positively vulnerability-free?<\/p>\n<p>Take Skype, for instance. A while ago, it was considered to be, besides a pretty good means of private messaging, an unassailable fortress which would yield to nobody, including single hackers and powerful government organisations. But since Skype Ltd. lost its independence after being acquired by Microsoft, things changed, and now we cannot be sure about Skype messaging being 100 percent secure.<\/p>\n<p>The WhatsApp service processing tens of billions of messages daily can hardly be considered safe. News about vulnerabilities (even if only in the Android version, excluding other platforms) appear at least monthly, adorned with details which make your insides churn. For example, a recent study of the application proved that an encrypted file storing the history of messaging on your device can be hacked in a matter of seconds with a simple script. On a side note, the recent <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/facebook-acquires-whatsapp-consequences-for-service-users\/\" target=\"_blank\" rel=\"noopener noreferrer\">acquisition of WhatsApp by Facebook<\/a> cannot speak in favour of safe messaging: the fact that Mark Zuckerberg paid billions of dollars for the developer team and technology, and not for the user data, is unheard of.<\/p>\n<p>To do justice to the aforementioned services, other free messaging platforms, from Viber to iMessage, have the same kind of problems. All of them allow for relatively easy ways to get access to private correspondence. So, to some extent, it might even be better if such services are property of large corporations which are entitled to prove their case to government and, more critically, to law enforcement authorities. Fortunately, for any action there\u2019s a counter-action: with so many unsecure messengers around, a number of presumably safer solutions sprang to life. Are they capable of saving the vital problem of privacy? Let\u2019s find out. But first, you have to decide which level of security would suit you best.<\/p>\n<div class=\"pullquote\">Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?<\/div>\n<p>There is a funny term \u2013 \u2018theatre of security\u2019. It is quite self-explanatory and means <em>ostensible<\/em> security measures which are used to provide an illusion of action without considering efficiency of the effort. If we were to draw analogies, we might remember anti-terrorist security measures on public transit facilities: the suspicious objects and individuals are checked on selected stations only. House intercom deployed in numerous residential buildings can also serve an example of this \u2018theatrical security\u2019. The same characteristics can be applied to the software sphere, especially in the case of instant messaging. That does not necessarily mean that some instant messengers are completely useless: it might well be that they could make a nice alternative to users who are not fussy about the privacy or high level of security. The guards taking care of anti-terror inspection on the underground have been able to offer some level of protection, after all. So, having said that, we must acknowledge you can still use a once-failed messaging app, provided they know what they want to be protected against: from a jealous partner eager to read their private messages, or people who are keen on hijacking the traffic on its way from a sender to a recipient. And yes, we do not consider situations when the person breaching your privacy is in fact your interlocutor: in this case, no advanced software would ever be able to protect you. So, if you don\u2019t have trust in your vis-\u00e0-vis, just don\u2019t message them!<\/p>\n<p>Let\u2019s have a look at popular options offered in two categories.<\/p>\n<p><strong>The illusion of safety<\/strong><\/p>\n<p>We categorised messengers not performing to the expected level of security or not guaranteeing protection from correspondence hijacking on the way (<a href=\"https:\/\/www.kaspersky.co.uk\/blog\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">man-in-the-middle<\/a> attack) into this list.<\/p>\n<p><strong><a href=\"https:\/\/itunes.apple.com\/us\/app\/confide-your-off-record-messenger\/id779883419?mt=8\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Confide<\/a><\/strong><\/p>\n<p>In a sense, it is a unique messenger: all messages coming via <a href=\"https:\/\/itunes.apple.com\/us\/app\/confide-your-off-record-messenger\/id779883419?mt=8\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Confide<\/a> are depicted as rectangular boxes hiding the text which becomes visible only upon swiping it. Moreover, the application does not offer long-term storage for history of messaging, so even if the culprit gets the phone, he would not be able to discover your correspondence. On an attempt to make a screenshot of the message, the user will be pushed back to the contact list and his interlocutor will get a respective notification. These capabilities are extensively highlighted by the app developers: you may read but you may not save. But there\u2019s one thing. Should a user want to record the message, he might not be obliged to make a screenshot and instead use a camera to register the communication process word-by-word. In this case, the application can be categorised as a program which exercises \u2018theatrical security\u2019: a state-of-the-art protection of messaging and screenshot disablement just to provide an illusion of safety. So it might suit those who want to play at being secret service agents.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192334\/Confide.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4491\" alt=\"Confide\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192334\/Confide.jpg\" width=\"269\" height=\"500\"><\/a><\/p>\n<p><strong><a href=\"https:\/\/www.mywickr.com\/en\/index.php\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Wickr<\/a><\/strong><\/p>\n<p>Not that elegant in terms of design, yet ambitious, <a href=\"https:\/\/www.mywickr.com\/en\/index.php\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">this application<\/a> positions itself as a solution leaving no trace of correspondence on the device: it erases (in some cases, irrevocably) message history both from the device memory and the server, protects the messages with government-grade security algorithms, provides means of controlling the duration of storing period for the recipient, and disables the message copying. The latter, similarly to the previous application, leans on the technical limitations of the smartphone functionality \u2013 the approach which is useless before a camera integrated in practically any device on Earth.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192333\/Wickr.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4492\" alt=\"Wickr\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192333\/Wickr.jpg\" width=\"250\" height=\"440\"><\/a><\/p>\n<p><strong><a href=\"https:\/\/telegram.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Telegram<\/a><\/strong><\/p>\n<p>When talking about the safe instant messengers, how can we ignore <a href=\"https:\/\/telegram.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Telegram<\/a>, which is presumably the most publicised messenger with a \u2018secure\u2019 tagline. How come it is included in our \u2018theatrical security\u2019 messenger list? Well, take the fact that \u2018unprecedented\u2019 security of messaging vouched by the developers of the app was never objectively proven, although used to be a subject of fair criticism.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192333\/Telegram.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4493\" alt=\"Telegram\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192333\/Telegram.jpg\" width=\"297\" height=\"500\"><\/a><\/p>\n<p>Many would remind us of a $200,000 bounty for hacking Telegram\u2019s MTProto protocol announced by the creators of the solution. In fact, for many, this aplomb might be a powerful argument for the messenger\u2019s reliability. However, we must draw your attention to the fact that this contest, presupposing an attempt to decipher a message transferred to a recipient from a sender, strongly reminds us of an attempt to test the endurance of the tank protection skin by a pistol when in fact it must effectively be done with help of an anti-tank weapon. In other words, the means and tools of hacking this messenger are initially inefficient and unable to stress-test the protocol. Pointing out this fact, a <a href=\"http:\/\/cryptofails.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">cryptofails.com<\/a> author also noted that MTProto is a highly insecure and unreliable algorithm \u2018which ignores all meaningful cryptography studies published in the last 20 years\u2019, and suggested the developers contract a real cryptography expert to audit Telegram.<\/p>\n<p>One more curious detail: regardless of a complex protocol serving the basis for Telegram, it is vulnerable to the straightforward app attack. Yes, we are not talking about the traffic hijacking but about a way simpler thing. The thing is that, on registration, a user receives a text message on the phone and has to enter the received security code to activate the app. But if a hacker gets hold of the victim\u2019s text messages, he can activate his copy of the app with another person\u2019s code and, consequently, receive all messages sent to the victim. Considering the fact that the \u2018Secure chat\u2019 capability is not enabled by default, the privacy of correspondence is to a high extent compromised.<\/p>\n<p>What is good about Telegram is its speed: the messages are indeed sent and delivered literally instantly, and notably quicker than via other messengers. So, is it a speedy messenger? Yes! Is it safe? Well, just relatively.<\/p>\n<p><strong>Honest safety<\/strong><\/p>\n<p>This category includes apps and services which provide a level of security fully compliant with officially proclaimed features and are able to substantially protect the access to correspondence from third-party assaults.<\/p>\n<p><strong><a href=\"https:\/\/threema.ch\/en\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Threema<\/a><\/strong><\/p>\n<p>This is a Swiss <a href=\"https:\/\/threema.ch\/en\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">project<\/a> which enjoyed growing popularity after the announced acquisition of WhatsApp. The developers guarantee the safety of correspondence: firstly, the software reliably encrypts the data in transfer; secondly, it protects user privacy via the face-to-face confirmation when a new contact is added. The latter presupposes that the corresponding users have to meet in person and scan QR codes from each other\u2019s phones, which looks sensible from a security standpoint but practically complicated in many cases. Of course, you can add a new contact in an old-school manner by manually typing the user ID, but in that case, the level of security is lower. It should be noted that the developers are not overstretching themselves to prove their messenger offers an \u2018unprecedented\u2019 level of safety and do not make false promises. And yes, one more thing: the app is worth two dollars, paid once.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192332\/Threema.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4494\" alt=\"Threema\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192332\/Threema.jpg\" width=\"260\" height=\"460\"><\/a><\/p>\n<p><strong><a href=\"https:\/\/silentcircle.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Silent Circle<\/a><\/strong><\/p>\n<p>This is one of very few projects developed by renowned cryptography gurus. In our case, the dev team includes Phil Zimmerman, the author of <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/pgp-reliable-privacy-security-and-authentication-for-everyone\/\" target=\"_blank\" rel=\"noopener noreferrer\">PGP encryption<\/a> technology. Similarly to Telegram, the <a href=\"https:\/\/silentcircle.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Silent Circle<\/a> service relies on a purpose-made algorithm, SCIMP. Its advantage lies in capability of fully erasing sent messages without a trace: neither a sender, nor a recipient would ever be able to recover any part of the correspondence on their devices. This capability is enabled both manually and automatically: within a certain period of time after the messages were sent, they will be deleted on their own accord. But the main merit of the messenger is that the software applies powerful encryption to the traffic, so it is rendered simply useless to hijack. By the way, the solution presupposes to transfer encrypted traffic including, besides text, video and audio messages. As for the rest, the messenger is, unfortunately, packed with flaws. They start with the ambiguous registration process and end with the price: one-year subscription for Silent Circle is worth 100 US dollars.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192332\/Silent-Text.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4495\" alt=\"Silent Text\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192332\/Silent-Text.jpg\" width=\"265\" height=\"465\"><\/a><\/p>\n<p><strong><a href=\"https:\/\/github.com\/WhisperSystems\/TextSecure\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">TextSecure<\/a><\/strong><\/p>\n<p>A free TextSecure app was warmly credited by the audience, and the developer, WhisperSystems, was highly spoken of by Edward Snowden. The software is effectively a very simple messenger, without any bells and whistles or complex settings, providing powerful encryption for both outbound and locally stored messages. To name a couple of small drawbacks: the app cannot be praised for rich functionality and also features Android-only compatibility, which is a serious imperfection\u00a0but developers say there will be iOS version <a href=\"https:\/\/twitter.com\/corbett\/status\/446748512123117568\" target=\"_blank\" rel=\"noopener nofollow\">very soon.<\/a>\u00a0On a side note, one of its founders is Moxie Marlinspike, a famous encryption specialist.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192332\/TextSecure.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4496\" alt=\"TextSecure\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192332\/TextSecure.jpg\" width=\"275\" height=\"450\"><\/a><\/p>\n<p><strong><a href=\"https:\/\/itunes.apple.com\/ru\/app\/sj\/id551363268?mt=8\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">SJ<\/a><\/strong><\/p>\n<p>$50 \u2013 this is the price for, probably, the most expensive, yet the most reliable, iOS-compatible messenger \u2013 <a href=\"https:\/\/itunes.apple.com\/app\/sj\/id551363268?mt=8\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">SJ<\/a>. Its main advantage lies within the ability to use individually picked complementary keys when sending a message. Or it can be rendered the main disadvantage, depending on the user\u2019s technical literacy. To those who got used to regular Skypes and WhatsApps, SJ may seem extremely difficult to use, so it is all about the choice: whether an unprecedented level of security or ease of use.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192331\/SJ.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4497\" alt=\"SJ\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192331\/SJ.jpg\" width=\"305\" height=\"510\"><\/a><\/p>\n<p><strong><a href=\"http:\/\/www.pidgin.im\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Pidgin<\/a><\/strong><\/p>\n<p>This is a <a href=\"http:\/\/www.pidgin.im\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">popular open-standard messenger<\/a> with a complete set of security protocols. It is free and compatible with Windows, Linux and Mac systems \u2013 however, the developers recommend Apple users take advantage of Adium, which supports encryption protocols up to an impressive 4096 bit which is a bit more than enough. The software seamlessly supports the OTR (Off-the-Record Messaging) protocol serving to ensure the privacy of correspondence and also has a lot of different plug-ins. A significant advantage of the solution, especially considering the topic of the article, is the support for XMPP\/Jabber, a decentralised, flexible, and safe instant messaging system.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192331\/Pidgin.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4498\" alt=\"Pidgin\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192331\/Pidgin.jpg\" width=\"207\" height=\"436\"><\/a><\/p>\n<p><strong><a href=\"https:\/\/crypto.cat\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Cryptocat<\/a><\/strong><\/p>\n<p>Similar to other solutions listed in our material, <a href=\"https:\/\/crypto.cat\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Cryptocat<\/a> is a messenger with message encryption capability; yet, unlike others, it functions as a desktop browser plug-in for Chrome, Firefox, Safari, and Opera. For Mac OS X and iPhone users, however, it is available as a separate app. Some time ago, the service underwent a successful attempt to compromise in- and outbound data, and the developer team put in an immense effort to increase the level of safety. The notable fact is that Cryptocat is constantly updated: the latest version was available in early April. Funny, that the project creator posted the following text on the project website: \u2018Cryptocat is not a magic bullet. Even though Cryptocat provides useful encryption, you should never trust any piece of software with your life, and Cryptocat is no exception.\u2019<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192329\/Cryprocat.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4499\" alt=\"Cryptocat\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192329\/Cryprocat.jpg\" width=\"310\" height=\"535\"><\/a><\/p>\n<p><strong>Coming soon<\/strong><\/p>\n<p>We\u2019ve listed some solutions under this heading since their creators have not yet fully launched the product, but have disclosed certain characteristics. Let\u2019s see how much these services would live up to the expectations set by their developers.<\/p>\n<p><strong><a href=\"https:\/\/heml.is\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Heml.is<\/a><\/strong><\/p>\n<p>Regardless of the fact that the Heml.is service is still under development, it\u2019s attracted a good deal of attention. It comes as no surprise, as one of the project participants is none other than Peter Sunde, one of the founding fathers of The Pirate Bay torrent tracker. Among the service features are an XMPP-based protocol and PGO library as an encryption basis. Among immediate advantages, we can enumerate a pleasant design (judging by the available presentations) and cross-platform compatibility.<\/p>\n<p><em>Bottomline:<\/em> a promising safe messenger; not available, though.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192329\/Hemlis.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4500\" alt=\"Hemlis\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192329\/Hemlis.jpg\" width=\"225\" height=\"385\"><\/a><\/p>\n<p><strong><a href=\"https:\/\/trac.torproject.org\/projects\/tor\/wiki\/org\/meetings\/2014WinterDevMeeting\/notes\/RoadmapTIMB\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Tor Instant Messaging Bundle<\/a> (TIMB)<\/strong><\/p>\n<p>The news of the Tor dev team working on a messenger dates back to end of February. Initially, the product was supposed to be based on the aforementioned Pidgin app, but later on, the choice was made in favour of Instantbird. <a href=\"https:\/\/trac.torproject.org\/projects\/tor\/wiki\/org\/meetings\/2014WinterDevMeeting\/notes\/RoadmapTIMB\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">TIMB<\/a>, as a notion, will also support the OTR protocol we talked of earlier, and the dev team would comprise of independent security experts as well. The app distribution approach is likely to be exercised as a part of the Tor Launcher bundle, but the information on the app availability is not disclosed yet. In any case, TIMB is worth waiting for: which other messenger would not only encrypt your correspondence but as well preserve your anonymity?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192328\/TIMB.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4501\" alt=\"TIMB\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/04\/05192328\/TIMB.jpg\" width=\"300\" height=\"270\"><\/a><\/p>\n<p><strong>Epilogue<\/strong><\/p>\n<p>It is obvious no cryptomessenger is ideal. Anyway, you must compromise on either your budget, ease of use, or the security level. Besides, secure online communication protection is not performed by one certain program \u2013 it has to be a combination of security means. Also, no software is able to offer a 100% guarantee of privacy if you do not trust your vis-\u00e0-vis and other interlocutors, or if your network is controlled from the outside, or if your device has been infiltrated by a spying malware; namely, a <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/keylogger\/\" target=\"_blank\" rel=\"noopener noreferrer\">keylogger<\/a>. Considering the solution for the first problem is not immediate, the rest of them are easily dealt with: a paid <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/vpns-use\" target=\"_blank\" rel=\"noopener noreferrer\">VPN access<\/a> for your system is about $5 a month, yet it might save you from threats coming from <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/wi-fi-alliance-pushes-for-secure-public-wireless\/\" target=\"_blank\" rel=\"noopener noreferrer\">public Wi-Fi<\/a> networks. As for keyloggers and other malware, there are <a href=\"https:\/\/www.kaspersky.co.uk\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener noreferrer\">reliable protection suites<\/a> like ours. With such protection means at hand, just add any XMPP\/Jabber-based messenger and rest assured your communication on the Internet is safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?<\/p>\n","protected":false},"author":214,"featured_media":3690,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026,9],"tags":[261,20,586,43,589,345,590,591,588,587,526],"class_list":{"0":"post-3689","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-encryption","10":"tag-facebook","11":"tag-messengers","12":"tag-privacy","13":"tag-silent-circle","14":"tag-skype","15":"tag-telegram","16":"tag-textsecure","17":"tag-threema","18":"tag-viber","19":"tag-whatsapp"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cryptomessaging\/3689\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cryptomessaging\/3334\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cryptomessaging\/3214\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cryptomessaging\/3634\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cryptomessaging\/3691\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cryptomessaging\/4489\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cryptomessaging\/3001\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cryptomessaging\/3340\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cryptomessaging\/3691\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cryptomessaging\/4489\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cryptomessaging\/4489\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/encryption\/","name":"encryption"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3689"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3689\/revisions"}],"predecessor-version":[{"id":18979,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3689\/revisions\/18979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/3690"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}