Encryption is a hot topic ever since a major China-government sponsored telecom attack, coined Salt Typhoon. Chinese hackers were able to breach several major telecommunications companies and gain unparalleled access to customers’ phone records, text messages, and even some internet browsing data. Experts emphasized the importance of using encrypted messaging apps, but what is encryption and how does it protect users from attackers?
Encryption is the process of converting a readable message, called plaintext, into unreadable gibberish, called ciphertext. The ciphertext can only be translated back into plaintext through a cryptographic key that both parties have access to. So, when a user sends an encrypted message, it starts as plaintext, is scrambled before being sent, and then is unscrambled using the cryptographic key on the receiving end. This is commonly referred to as end-to-end encryption (E2EE).
If data, such as a phone call, email, or text message, is intercepted by bad actors on its way to a recipient, it can be used for nefarious purposes like a hacking ploy, identity theft, or even espionage. But if the data is encrypted, it remains unreadable when intercepted because it is still in its ciphertext form. Unless the hackers have the cryptographic key, or can crack it, then the information is useless to them.
To use encryption effectively, it’s important to utilize tools that already have it built into their systems. Fortunately, many of the tools you’re already using support E2EE. Salt Typhoon targeted phone calls and text messages that were sent without it.
The FBI and Cybersecurity and Infrastructure Security Agency (CISA) advise users to utilize E2EE messaging and phone applications, since SMS messages are not encrypted. Users communicating from Apple products to Apple products, or Android to Android, are secure (iMessage and Google Messages use E2EE). However, users communicating Apple to Android and vice versa are at risk. RCS, the primary message carrier between these products, is not E2EE.
There are several apps you can utilize to mitigate your risk:
There’s more to protecting your data than encryption. At KAPCOM, we offer an all-encompassing approach to cybersecurity. Not only do our products and services implement E2EE, but they cover many other essential tenants of effective protection. Book a free consultation to start a conversation on where we can fortify your online security!