SlideShare a Scribd company logo
Productive Use of WhatsApp and
Its Security Issues
Rtn Dominic M. Kornu (@qaphui)
(RC Sunyani Central)
What is WhatsApp?
• It is a cross-platform messaging app for
smartphones that allows users to send text
messages, documents and multimedia files to
friends via the Internet.
• It works with a set of open protocols for
instant messaging that are broadcast on
thousands of servers spread across the
Internet.
06/10/2016 @qaphui 2
Some history?
 Launched in 2009
 February, 2014: Bought by
Facebook for $19Bn
 January 18, 2016: Free
subscription
 February 1, 2016: 1 Billion users
 February 4, 2016: Chat group
increased from 50 to 256
members
 April 5, 2016: End-t-o-end
encryption introduced
 May 10, 2016: Desktop version
released
 June 23, 2016: 1,100 calls made
per second
 > 42Bn messages sent per day
Founders: Brian Acton (L) and Jan Koum(R)
06/10/2016 @qaphui 3
Application
• Education
• Business
– MEST’s Beam service
• Agriculture
– Indian’s agroinformation-based groups
• Relief Services
– Hudhud restoration exercise
• Journalism
• Etc. …
06/10/2016 @qaphui 4
Productivity tips
• Share relevant messages based on group’s
objectives
• limit messages to a max of 10 lines
• Share messages ONLY at agreed times in a
group
• Confirm facts before sharing
• READ web links and other information before
sharing them
• Be sensitive when sharing certain information
– Add descriptions to media you share
06/10/2016 @qaphui 5
Productivity tips
• DON’T add friends/mentors/associates to a
group without asking them first
• DON’T add friends/mentors/associates to a
broadcast list without asking them first.
• DON’T engage an individual in a conversation
in a group’s page. Kindly PM.
• Being online DOESN’T mean I want to chat.
• Avoid shorthand! (USE correct grammar)
06/10/2016 @qaphui 6
Productivity tips (Features)
• Mute group/individual chats
• You can use custom notifications
• Mark messages as read/unread
• Create and use a broadcast list
• Star messages you wish to come back to
• Use the search feature to look for specific
words in a chat history
06/10/2016 @qaphui 7
Productivity tips (Features)
• Disable automatic download of images,
videos, documents
• Select Low Data Usage for calls
• Use info icon to see who’s read your message
• Use ‘@’ to select a specific member in a group
you intend to mention in your message
06/10/2016 @qaphui 8
Productivity tips (Features)
• Switch off read receipts
• Hide ‘last seen’ time
• Use reply icon to respond to a specific
message
• Back up your chats
– Default feature
– Google Drive
06/10/2016 @qaphui 9
End-to-End Encrytion?
• End-to-end encryption (E2EE) is a system of
communication where only the people
communicating can read the messages. No
eavesdropper can access the cryptographic
keys needed to decrypt the conversation,
including telecom providers, Internet
providers and the company that runs the
messaging service.
06/10/2016 @qaphui 10
Security threats/tips
• Web malware
– Use antiviruses (update regularly)
– Ignore e-mail messages informing you of missed
WhatsApp calls
• Metadata can be accessed from WA servers
• Reading of stored database of messages on
your phone
– Clear database files from phone
06/10/2016 @qaphui 11
Security threats/tips
• Delete media files from phone
– Locking the app and hiding picture folder from
phone’s gallery IS NOT foolproof!
• Verify security code for contacts you chat with
• Restrict access to profile picture
• Deactivate WhatsApp if you lose your phone
• Be careful what you talk about
06/10/2016 @qaphui 12
New text formatting?
06/10/2016 @qaphui 13
WhatsApp?
06/10/2016 @qaphui 14

More Related Content

What's hot

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
encryption and decryption
encryption and decryptionencryption and decryption
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Best Cyber Security Projects | The Knowledge Academy
Best Cyber Security Projects | The Knowledge Academy Best Cyber Security Projects | The Knowledge Academy
Best Cyber Security Projects | The Knowledge Academy
The Knowledge Academy
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
yousef emami
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
Nousheen Arshad
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
Gonetech Solutions
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Adarsh Kumar Yadav
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
Raghav Chhabra
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
CAS
 
HACKING
HACKINGHACKING
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 

What's hot (20)

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
encryption and decryption
encryption and decryptionencryption and decryption
encryption and decryption
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Best Cyber Security Projects | The Knowledge Academy
Best Cyber Security Projects | The Knowledge Academy Best Cyber Security Projects | The Knowledge Academy
Best Cyber Security Projects | The Knowledge Academy
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
HACKING
HACKINGHACKING
HACKING
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Similar to WhatsApp and its security issues

Content strategy in social media platforms
Content strategy in social media platformsContent strategy in social media platforms
Content strategy in social media platforms
Hossein sharafi
 
Social Media Analytics Department For Work and Pensions Research Seminar
Social Media Analytics Department For Work and Pensions Research SeminarSocial Media Analytics Department For Work and Pensions Research Seminar
Social Media Analytics Department For Work and Pensions Research Seminar
Dr Wasim Ahmed
 
Tablet engagement 2013
Tablet engagement 2013Tablet engagement 2013
Tablet engagement 2013Mag+
 
London Twitter Developer community meet up - Sept 2016
London Twitter Developer community meet up - Sept 2016London Twitter Developer community meet up - Sept 2016
London Twitter Developer community meet up - Sept 2016
Angus Fox
 
SERVICES PROVIDED BY THE INTERNET
SERVICES PROVIDED BY THE INTERNETSERVICES PROVIDED BY THE INTERNET
SERVICES PROVIDED BY THE INTERNET
Sahil Nagpal
 
BCS 2016 "Intro to Microservices (and the Seven Deadly Sins)"
BCS 2016 "Intro to Microservices (and the Seven Deadly Sins)"BCS 2016 "Intro to Microservices (and the Seven Deadly Sins)"
BCS 2016 "Intro to Microservices (and the Seven Deadly Sins)"
Daniel Bryant
 
The NDIS: a role-based ICT approach - Dr Scott Hollier at the Disability Empl...
The NDIS: a role-based ICT approach - Dr Scott Hollier at the Disability Empl...The NDIS: a role-based ICT approach - Dr Scott Hollier at the Disability Empl...
The NDIS: a role-based ICT approach - Dr Scott Hollier at the Disability Empl...
Media Access Australia
 
E-tech lesson 1.pptx
E-tech lesson 1.pptxE-tech lesson 1.pptx
E-tech lesson 1.pptx
Christopher Pontejo
 
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Hendrik Speck
 
Microservice Summit 2016 "Microservices: The Organisational and People Impact"
Microservice Summit 2016 "Microservices: The Organisational and People Impact"Microservice Summit 2016 "Microservices: The Organisational and People Impact"
Microservice Summit 2016 "Microservices: The Organisational and People Impact"
Daniel Bryant
 
Microservices: The Organizational and People Impact
Microservices: The Organizational and People ImpactMicroservices: The Organizational and People Impact
Microservices: The Organizational and People Impact
Ambassador Labs
 
Collaborative Development-QUIBETE GROUP
Collaborative Development-QUIBETE GROUPCollaborative Development-QUIBETE GROUP
Collaborative Development-QUIBETE GROUP
herrodrhian quibete
 
Workshop slides - Introduction to AtoM and Archivematica
Workshop slides - Introduction to AtoM and ArchivematicaWorkshop slides - Introduction to AtoM and Archivematica
Workshop slides - Introduction to AtoM and Archivematica
Artefactual Systems - Archivematica
 
National Archives of Norway - AtoM and Archivematica intro workshop
National Archives of Norway - AtoM and Archivematica intro workshopNational Archives of Norway - AtoM and Archivematica intro workshop
National Archives of Norway - AtoM and Archivematica intro workshop
Artefactual Systems - AtoM
 
Empathy training & the accessible web experience
Empathy training & the accessible web experienceEmpathy training & the accessible web experience
Empathy training & the accessible web experience
Media Access Australia
 
Social networking
Social networkingSocial networking
Social networkingEsha
 
A .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social mediaA .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social mediaRoy Lachica
 
Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15
PAVS Communities 2.0
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
Abhishek Srivastava
 

Similar to WhatsApp and its security issues (20)

Content strategy in social media platforms
Content strategy in social media platformsContent strategy in social media platforms
Content strategy in social media platforms
 
Social Media Analytics Department For Work and Pensions Research Seminar
Social Media Analytics Department For Work and Pensions Research SeminarSocial Media Analytics Department For Work and Pensions Research Seminar
Social Media Analytics Department For Work and Pensions Research Seminar
 
Tablet engagement 2013
Tablet engagement 2013Tablet engagement 2013
Tablet engagement 2013
 
London Twitter Developer community meet up - Sept 2016
London Twitter Developer community meet up - Sept 2016London Twitter Developer community meet up - Sept 2016
London Twitter Developer community meet up - Sept 2016
 
SERVICES PROVIDED BY THE INTERNET
SERVICES PROVIDED BY THE INTERNETSERVICES PROVIDED BY THE INTERNET
SERVICES PROVIDED BY THE INTERNET
 
BCS 2016 "Intro to Microservices (and the Seven Deadly Sins)"
BCS 2016 "Intro to Microservices (and the Seven Deadly Sins)"BCS 2016 "Intro to Microservices (and the Seven Deadly Sins)"
BCS 2016 "Intro to Microservices (and the Seven Deadly Sins)"
 
D) Emerging ICT Tools
D) Emerging ICT ToolsD) Emerging ICT Tools
D) Emerging ICT Tools
 
The NDIS: a role-based ICT approach - Dr Scott Hollier at the Disability Empl...
The NDIS: a role-based ICT approach - Dr Scott Hollier at the Disability Empl...The NDIS: a role-based ICT approach - Dr Scott Hollier at the Disability Empl...
The NDIS: a role-based ICT approach - Dr Scott Hollier at the Disability Empl...
 
E-tech lesson 1.pptx
E-tech lesson 1.pptxE-tech lesson 1.pptx
E-tech lesson 1.pptx
 
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
 
Microservice Summit 2016 "Microservices: The Organisational and People Impact"
Microservice Summit 2016 "Microservices: The Organisational and People Impact"Microservice Summit 2016 "Microservices: The Organisational and People Impact"
Microservice Summit 2016 "Microservices: The Organisational and People Impact"
 
Microservices: The Organizational and People Impact
Microservices: The Organizational and People ImpactMicroservices: The Organizational and People Impact
Microservices: The Organizational and People Impact
 
Collaborative Development-QUIBETE GROUP
Collaborative Development-QUIBETE GROUPCollaborative Development-QUIBETE GROUP
Collaborative Development-QUIBETE GROUP
 
Workshop slides - Introduction to AtoM and Archivematica
Workshop slides - Introduction to AtoM and ArchivematicaWorkshop slides - Introduction to AtoM and Archivematica
Workshop slides - Introduction to AtoM and Archivematica
 
National Archives of Norway - AtoM and Archivematica intro workshop
National Archives of Norway - AtoM and Archivematica intro workshopNational Archives of Norway - AtoM and Archivematica intro workshop
National Archives of Norway - AtoM and Archivematica intro workshop
 
Empathy training & the accessible web experience
Empathy training & the accessible web experienceEmpathy training & the accessible web experience
Empathy training & the accessible web experience
 
Social networking
Social networkingSocial networking
Social networking
 
A .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social mediaA .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social media
 
Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 

More from Kofi Kafui Kornu

Acceptable Use Policy: Essential components of a social media policy to manag...
Acceptable Use Policy: Essential components of a social media policy to manag...Acceptable Use Policy: Essential components of a social media policy to manag...
Acceptable Use Policy: Essential components of a social media policy to manag...
Kofi Kafui Kornu
 
Roles of Rotary club leaders
Roles of Rotary club leadersRoles of Rotary club leaders
Roles of Rotary club leaders
Kofi Kafui Kornu
 
A talk on Rotary's Presidential citation
A talk on Rotary's Presidential citationA talk on Rotary's Presidential citation
A talk on Rotary's Presidential citation
Kofi Kafui Kornu
 
Youth service - Experiences, Benefits & Challenges
Youth service - Experiences, Benefits & ChallengesYouth service - Experiences, Benefits & Challenges
Youth service - Experiences, Benefits & Challenges
Kofi Kafui Kornu
 
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoringRhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
Kofi Kafui Kornu
 
Leadership and Professional Development
Leadership and Professional DevelopmentLeadership and Professional Development
Leadership and Professional Development
Kofi Kafui Kornu
 
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
Kofi Kafui Kornu
 
Fake news -- a conversation
Fake news -- a conversationFake news -- a conversation
Fake news -- a conversation
Kofi Kafui Kornu
 
Rotary formula
Rotary formula Rotary formula
Rotary formula
Kofi Kafui Kornu
 
Online Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a NetizenOnline Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a Netizen
Kofi Kafui Kornu
 
Technical glitch, or ...?
Technical glitch, or ...?Technical glitch, or ...?
Technical glitch, or ...?
Kofi Kafui Kornu
 
Business Plan: Risks & Challenges
Business Plan: Risks & ChallengesBusiness Plan: Risks & Challenges
Business Plan: Risks & Challenges
Kofi Kafui Kornu
 

More from Kofi Kafui Kornu (12)

Acceptable Use Policy: Essential components of a social media policy to manag...
Acceptable Use Policy: Essential components of a social media policy to manag...Acceptable Use Policy: Essential components of a social media policy to manag...
Acceptable Use Policy: Essential components of a social media policy to manag...
 
Roles of Rotary club leaders
Roles of Rotary club leadersRoles of Rotary club leaders
Roles of Rotary club leaders
 
A talk on Rotary's Presidential citation
A talk on Rotary's Presidential citationA talk on Rotary's Presidential citation
A talk on Rotary's Presidential citation
 
Youth service - Experiences, Benefits & Challenges
Youth service - Experiences, Benefits & ChallengesYouth service - Experiences, Benefits & Challenges
Youth service - Experiences, Benefits & Challenges
 
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoringRhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
 
Leadership and Professional Development
Leadership and Professional DevelopmentLeadership and Professional Development
Leadership and Professional Development
 
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
 
Fake news -- a conversation
Fake news -- a conversationFake news -- a conversation
Fake news -- a conversation
 
Rotary formula
Rotary formula Rotary formula
Rotary formula
 
Online Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a NetizenOnline Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a Netizen
 
Technical glitch, or ...?
Technical glitch, or ...?Technical glitch, or ...?
Technical glitch, or ...?
 
Business Plan: Risks & Challenges
Business Plan: Risks & ChallengesBusiness Plan: Risks & Challenges
Business Plan: Risks & Challenges
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

WhatsApp and its security issues

  • 1. Productive Use of WhatsApp and Its Security Issues Rtn Dominic M. Kornu (@qaphui) (RC Sunyani Central)
  • 2. What is WhatsApp? • It is a cross-platform messaging app for smartphones that allows users to send text messages, documents and multimedia files to friends via the Internet. • It works with a set of open protocols for instant messaging that are broadcast on thousands of servers spread across the Internet. 06/10/2016 @qaphui 2
  • 3. Some history?  Launched in 2009  February, 2014: Bought by Facebook for $19Bn  January 18, 2016: Free subscription  February 1, 2016: 1 Billion users  February 4, 2016: Chat group increased from 50 to 256 members  April 5, 2016: End-t-o-end encryption introduced  May 10, 2016: Desktop version released  June 23, 2016: 1,100 calls made per second  > 42Bn messages sent per day Founders: Brian Acton (L) and Jan Koum(R) 06/10/2016 @qaphui 3
  • 4. Application • Education • Business – MEST’s Beam service • Agriculture – Indian’s agroinformation-based groups • Relief Services – Hudhud restoration exercise • Journalism • Etc. … 06/10/2016 @qaphui 4
  • 5. Productivity tips • Share relevant messages based on group’s objectives • limit messages to a max of 10 lines • Share messages ONLY at agreed times in a group • Confirm facts before sharing • READ web links and other information before sharing them • Be sensitive when sharing certain information – Add descriptions to media you share 06/10/2016 @qaphui 5
  • 6. Productivity tips • DON’T add friends/mentors/associates to a group without asking them first • DON’T add friends/mentors/associates to a broadcast list without asking them first. • DON’T engage an individual in a conversation in a group’s page. Kindly PM. • Being online DOESN’T mean I want to chat. • Avoid shorthand! (USE correct grammar) 06/10/2016 @qaphui 6
  • 7. Productivity tips (Features) • Mute group/individual chats • You can use custom notifications • Mark messages as read/unread • Create and use a broadcast list • Star messages you wish to come back to • Use the search feature to look for specific words in a chat history 06/10/2016 @qaphui 7
  • 8. Productivity tips (Features) • Disable automatic download of images, videos, documents • Select Low Data Usage for calls • Use info icon to see who’s read your message • Use ‘@’ to select a specific member in a group you intend to mention in your message 06/10/2016 @qaphui 8
  • 9. Productivity tips (Features) • Switch off read receipts • Hide ‘last seen’ time • Use reply icon to respond to a specific message • Back up your chats – Default feature – Google Drive 06/10/2016 @qaphui 9
  • 10. End-to-End Encrytion? • End-to-end encryption (E2EE) is a system of communication where only the people communicating can read the messages. No eavesdropper can access the cryptographic keys needed to decrypt the conversation, including telecom providers, Internet providers and the company that runs the messaging service. 06/10/2016 @qaphui 10
  • 11. Security threats/tips • Web malware – Use antiviruses (update regularly) – Ignore e-mail messages informing you of missed WhatsApp calls • Metadata can be accessed from WA servers • Reading of stored database of messages on your phone – Clear database files from phone 06/10/2016 @qaphui 11
  • 12. Security threats/tips • Delete media files from phone – Locking the app and hiding picture folder from phone’s gallery IS NOT foolproof! • Verify security code for contacts you chat with • Restrict access to profile picture • Deactivate WhatsApp if you lose your phone • Be careful what you talk about 06/10/2016 @qaphui 12