When we talk about secure messaging apps, the names that sound louder are Signal, Telegram, and WhatsApp. Today we face them face to face to see what is the safest messaging application for Android.
Therefore, we will leave in the background design, functionalities, number of users, and other important factors when comparing messaging applications to focus solely on the security and privacy of these three applications. Which will be the best stop?
The first thing you should consider when installing an application if you are concerned about your privacy is the permissions they require althoughit is true that this has changed a lot since Marshmallow and its permissions at runtime arrived. With them, the permissions are only asked if they are necessary, and you are free not to grant them if you dont want to use that function.
Telegram and WhatsApp have almost the same permissions except that of access to SMS (used for account verification), which is no longer necessary in Telegram but is still present in WhatsApp. Signal has the same Telegram permissions but adds one more: the calendar one. This permission is used to share your calendar events with other people in Signal.
All three apps make reasonable use of permissions
All three applications make reasonable use of permissions, asking for them only when necessary. Thus, you only need to grant the camera permission to send photos, or the storage permission to send files and photos saved on the mobile. In this regard, all applications behave the same.
Where there are some differences are in what permissions are really necessary for the basic use of the application. Telegram insists enough during the initial setup to grant you access to the call log, though you can use it without granting single permission. The same with Signal: your life will be easier if you add permission to contacts, although technically you can do it without them, adding by username in Telegram or by phone number in Signal.
WhatsApp is the only one that forces you to grant access permission to contacts. Without it, you cant start a conversation with the app on its own, although you could use this method to talk to someone with their phone number. In summary, the three applications handle permissions with sanity, although WhatsApp makes it a little more difficult for you. Point for Telegram and Signal.
Before worrying about what happens to your data in transit from your mobile to the receiver (i.e. encryption), you should also take into account the security of your data on the phone itself. What if someone has physical access, even if momentary, to your phone?
I am sure that if you are concerned about the privacy of your data you will have established an unlock protection for your mobile, but perhaps Smart Unlock or other technology relaxes security. If a person has access to your phone, can they read your chats from Telegram, WhatsApp, and Signal?
Fortunately, all three applications include a native function for protecting chats from outside eyes, after WhatsApp added fingerprint protection. In none of the cases, the protection comes active from home, but it is you who must activate it from the settings.
There are some differences between the available options, however. Signal uses the Android lock and can be activated automatically after a period of time, while on Telegram you have a little more control, being able to use a PIN or password and block the application at any time with the padlock icon. WhatsApp has the protection with fewer options since it can only be through a fingerprint. More options, more points. Point for Telegram.
All three applications use end-to-end encryption (WhatsApp is signed by the creators of Signal, to be exact) although I already anticipate that Telegram will not take any point in this section. Not because your home-cooked MTProto encryption is insecure, but because not activated in all chats by default (normal chats are encrypted, but not end-to-end).
While WhatsApp and Signal use end-to-end encryption for all communications, in Telegram it is only used in secret chats, which add other extra security features like protection against screenshots and self-destructing messages.
Without secret chats, Telegram continues to encrypt messages between the client and cloud and there is only evidence of a vulnerability in the implementation, which dates from 2013. Although the experts are not very enthusiastic about the fact that Telegram uses its own implementation, on paper, it seems that in terms of security it has everything tied and well tied.
However, it is obvious that those who care about their safety prefer that encryption occurs entirely on the sender and receiver, without servers in between. Although all three applications can potentially do it, only WhatsApp and Signal do it in a transparent way for the user, who should not take any additional steps.
For example,someone calls a pizzeria and orders a pizza, whoever listens to the conversation will know what has happened, but the same can also be deduced through metadata. This person called this phone that belongs to a pizzeria at lunchtime he will have ordered a pizza. Something similar happens with our conversations.With encryption, nobody can read your messages, but they can know who you are talking to and from where, by the metadata
WhatsApp collects a good amount of metadata of your users such as IP addresses, dates of use, phone and model, network operator, phone number, unique device identifier, location, and contacts. By crossing this information, even without being able to read the content of the messages, you can make pretty rough assumptions about who youre talking to and in some cases what.
Telegram It is based on the cloud so technically all your messages, photos, and files sent in non-private conversations are stored (encrypted, yes) on their servers, although in terms of metadata it is not very clear what other data they collect besides your contacts, devices and IP addresses. These data are stored for a maximum period of one year.
The signal is the only app on our list that minimizes metadata that saves. It only archives the last time you connected (the day, not even the time) and the phone number of your account. So, point for Signal.
Now that we have covered the most important thing is time to assess the additional merits of each of the applications. Do they have added functions for improving your privacy and security that others do not have?
In the case of WhatsApp, the most relevant are the privacy options with which you can hide profile picture, connection time, info, and status of some or all people, who can add you to groups and verification in two steps. There really isnt much else to catch the attention of privacy lovers.
Signal it does not let you choose who can see your name and profile photo (it is shown to all the contacts you have in your account) but otherwise, it also includes two-step verification (call here with more success) Registration lock PIN), self-destructing messages, notifications without messages, incognito keyboard and blocking (optional) against screenshots.
Signal adds to this the possibility of masking your IP address in calls and the self-deletion of old messages after exceeding a certain amount. With the advantage that all of the above is available in all conversations.
Considering that Signal was born as a secure messaging app, it should come as no surprise to anyone that it brings quite a few privacy options as standard. It has some more than Telegram, although in exchange Telegram gives you more control over who can and cannot contact you or see your information. The last point is shared for Signal and Telegram.
We have reached the end of the comparison and the time has come to count the votes. In case you dont feel like going back over your steps to add up the points of each application, here is a summary table.
Telegram
Signal
So that, Signal is the best messaging application in terms of privacy and security, scoring a point against WhatsApp and Telegram on practically all the fronts that we have analyzed previously. The only thing he doesnt take home about is access protection that, although it has it, it is not as complete as that of Telegram.
WhatsApp only excels in encryption, at a point that it shares with Signal as it is powered by the same Open Whisper encryption. By last, Telegram is in the second position with three points thanks to its padlock to protect chats, the precision of its privacy options, and the fact that you can technically use it without granting single permission.
Telegram
Signal
View post:
What is the safest messaging app? - Asap Land
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]