SlideShare a Scribd company logo
PARUL UNIVERSITY
Create by ::
Umang Talpara(170303105342)
Parth Thummar(170303105352)
Pramay Thumar(170303105350)
Class: Cse 6B1(IS)
THE MOST SECURE MESSAGING APP
 All around the world, users turn to
Viber to have open and authentic
conversations with their friends,
family and colleagues. With Viber
you can rest assured, knowing
that your personal chats are
always protected and private and
that all your conversations are
your own. Our mission is to
protect that privacy so you never
have to think twice about what
you can or can’t share when
you’re using Viber.
WE DON’T READ OR LISTEN TO ANY OF YOUR
CHATS AND CALLS
 Unlike other messaging apps, Viber
can’t read your personal chats (including
one-on-one chats and group chats) or
listen in on your audio or video calls. We
can’t access your messages since we
use end-to-end encryption by default.
You don’t have to go out of your way to
turn it on. This means that your private
and group communications are
completely encrypted so that only you
and the people you’re talking to can
read or hear them.
WE CAN’T AND DON’T SELL YOUR CONTENT
 When your chats are protected by end-to-end
encryption, no one can access them. Perhaps most
importantly, Viber doesn’t have access to them—which
means nothing you share can be used to target you with
ads later. Other messaging apps will not fully encrypt
your chats automatically for you unless you actively turn
on the encryption mode. This means that some of these
apps can access, read and sell your private
conversations to other 3rd parties or advertisers. Viber’s
policy guarantees that we can’t sell your private
information since we chose to have no access to your
private chats and calls in the first place. So, you can be
sure you won’t mysteriously see ads related to
something you were just talking about with a friend on
Viber.
MORE THAN ENCRYPTION
 Not only are your communications protected by
end-to-end encryption by default, nothing you
share is ever stored on Viber’s servers once
delivered. In fact, the messages you send make
their way from your device to the recipient’s as an
encrypted code. If the recipient’s phone is off or
they don’t have an internet connection, for
example, your message will wait patiently on
Viber’s servers for a limited time—still safe and
encrypted—until their device is prepared to receive
and decrypt it.
100% privacy you can trust::
Thanks to end-to-end encryption, any type of
information you share will always remain between
yourself and the person you’re talking to. This means
you never have to think twice about what you can or
can’t share when you’re using Viber.
IN-TRANSIT ENCRYPTION
 For extra protection, everything Viber
sends from your device to the server
on its way to your recipient’s device
is encrypted as it travels across the
internet.
END-TO-END ENCRYPTION
BY DEFAULT
 Messages you send make their way from
your device to the recipient’s in the form
of an encrypted code that only their
device can translate to plain text using an
encryption key. Encryption keys exist only
on user devices and nowhere else. So,
no one — not even Viber — can read
your messages.
TRUST YOUR CONTACTS
 Verify the identity of the person you’re
communicating with. In your chat info screen,
authenticate and confirm that the person you’re
chatting with is who they say they are. This
provides you with an extra level of security
protection if anything changes with your contact.
An added sense of privacy::
While Viber’s end-to-end encryption by default
gives users peace of mind, sometimes we need even
more privacy. These privacy features enable users to
share extra-sensitive information.
HIDDEN CHATS
 Planning a surprise party and don’t want
anyone to accidentally see your
conversation? Hide conversations from
your main chat list and access them
whenever you need to with a PIN.
SELF-DESTRUCTING CHATS
 Secret Chats lets you set a self-destruct timer
for every message in your conversation so that
after your message is read, it is automatically
deleted from the Viber chat.
STAY UNDER THE RADAR
 Control when others can see your online
status and the delivery status of the
messages they send you.
THE MOST SECURE MESSAGING APP (information security)

More Related Content

More from umang talpara

Disaster management Emergency operation center
Disaster management Emergency operation centerDisaster management Emergency operation center
Disaster management Emergency operation center
umang talpara
 
Bhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talparaBhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talpara
umang talpara
 
EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)
umang talpara
 
Daily milk Management
Daily milk ManagementDaily milk Management
Daily milk Management
umang talpara
 
Online test (java)
Online test (java)Online test (java)
Online test (java)
umang talpara
 
Disaster management cycle
Disaster management cycleDisaster management cycle
Disaster management cycle
umang talpara
 

More from umang talpara (6)

Disaster management Emergency operation center
Disaster management Emergency operation centerDisaster management Emergency operation center
Disaster management Emergency operation center
 
Bhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talparaBhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talpara
 
EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)
 
Daily milk Management
Daily milk ManagementDaily milk Management
Daily milk Management
 
Online test (java)
Online test (java)Online test (java)
Online test (java)
 
Disaster management cycle
Disaster management cycleDisaster management cycle
Disaster management cycle
 

Recently uploaded

Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 

Recently uploaded (20)

Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 

THE MOST SECURE MESSAGING APP (information security)

  • 1. PARUL UNIVERSITY Create by :: Umang Talpara(170303105342) Parth Thummar(170303105352) Pramay Thumar(170303105350) Class: Cse 6B1(IS)
  • 2. THE MOST SECURE MESSAGING APP  All around the world, users turn to Viber to have open and authentic conversations with their friends, family and colleagues. With Viber you can rest assured, knowing that your personal chats are always protected and private and that all your conversations are your own. Our mission is to protect that privacy so you never have to think twice about what you can or can’t share when you’re using Viber.
  • 3. WE DON’T READ OR LISTEN TO ANY OF YOUR CHATS AND CALLS  Unlike other messaging apps, Viber can’t read your personal chats (including one-on-one chats and group chats) or listen in on your audio or video calls. We can’t access your messages since we use end-to-end encryption by default. You don’t have to go out of your way to turn it on. This means that your private and group communications are completely encrypted so that only you and the people you’re talking to can read or hear them.
  • 4. WE CAN’T AND DON’T SELL YOUR CONTENT  When your chats are protected by end-to-end encryption, no one can access them. Perhaps most importantly, Viber doesn’t have access to them—which means nothing you share can be used to target you with ads later. Other messaging apps will not fully encrypt your chats automatically for you unless you actively turn on the encryption mode. This means that some of these apps can access, read and sell your private conversations to other 3rd parties or advertisers. Viber’s policy guarantees that we can’t sell your private information since we chose to have no access to your private chats and calls in the first place. So, you can be sure you won’t mysteriously see ads related to something you were just talking about with a friend on Viber.
  • 5. MORE THAN ENCRYPTION  Not only are your communications protected by end-to-end encryption by default, nothing you share is ever stored on Viber’s servers once delivered. In fact, the messages you send make their way from your device to the recipient’s as an encrypted code. If the recipient’s phone is off or they don’t have an internet connection, for example, your message will wait patiently on Viber’s servers for a limited time—still safe and encrypted—until their device is prepared to receive and decrypt it.
  • 6. 100% privacy you can trust:: Thanks to end-to-end encryption, any type of information you share will always remain between yourself and the person you’re talking to. This means you never have to think twice about what you can or can’t share when you’re using Viber.
  • 7. IN-TRANSIT ENCRYPTION  For extra protection, everything Viber sends from your device to the server on its way to your recipient’s device is encrypted as it travels across the internet.
  • 8. END-TO-END ENCRYPTION BY DEFAULT  Messages you send make their way from your device to the recipient’s in the form of an encrypted code that only their device can translate to plain text using an encryption key. Encryption keys exist only on user devices and nowhere else. So, no one — not even Viber — can read your messages.
  • 9. TRUST YOUR CONTACTS  Verify the identity of the person you’re communicating with. In your chat info screen, authenticate and confirm that the person you’re chatting with is who they say they are. This provides you with an extra level of security protection if anything changes with your contact.
  • 10. An added sense of privacy:: While Viber’s end-to-end encryption by default gives users peace of mind, sometimes we need even more privacy. These privacy features enable users to share extra-sensitive information.
  • 11. HIDDEN CHATS  Planning a surprise party and don’t want anyone to accidentally see your conversation? Hide conversations from your main chat list and access them whenever you need to with a PIN.
  • 12. SELF-DESTRUCTING CHATS  Secret Chats lets you set a self-destruct timer for every message in your conversation so that after your message is read, it is automatically deleted from the Viber chat.
  • 13. STAY UNDER THE RADAR  Control when others can see your online status and the delivery status of the messages they send you.