2021
DOI: 10.1155/2021/9965573
|View full text |Cite
|
Sign up to set email alerts
|

The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications

Abstract: In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-to-end encrypted conversations, extending and making popular the old Off-the-Record protocol. New implementations of such end-to-end encrypted messaging protocols have appeared, and several popular chat applications have been updated to use such protocols. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…Security of Messengers: A systematization of knowledge by Unger et al [52] provides an extensive overview of security features in many instant messaging applications. Similarly, also other studies have analyzed security features of specific subsets of messengers and their cryptographic foundations [1], [20], [21], protocols [9], [17], [24], [42], or exploited specific features such as contact discovery to crawl millions of American phone numbers [19].…”
Section: Related Workmentioning
confidence: 99%
“…Security of Messengers: A systematization of knowledge by Unger et al [52] provides an extensive overview of security features in many instant messaging applications. Similarly, also other studies have analyzed security features of specific subsets of messengers and their cryptographic foundations [1], [20], [21], protocols [9], [17], [24], [42], or exploited specific features such as contact discovery to crawl millions of American phone numbers [19].…”
Section: Related Workmentioning
confidence: 99%
“…Some studies advised that, given that communications travel through insecure channels, IM apps should secure their transmissions (preferably, with end‐to‐end encryption) and user‐generated data [24, 43, 44], along with local encrypted databases [45], as a way to protect the app from unauthorised (either physical or logical) access to the device. It has been detected a lack of user awareness on mobile security, and it cannot be comparable to current computer awareness [46].…”
Section: Related Workmentioning
confidence: 99%
“…Based on the findings of Koyuncu and Pusalti [10], showing that user's mobile security awareness is considerably low compared to computers' security awareness. Message transmissions are not secured and private as they should, as derived from Conti et al [11], Johansen et al [12], and Aceto et al [13,14] researches on network traffic analysis. Additionally, and related to privacy issues, some studies have pointed out that there are no clear privacy policies for users, leaving unanswered (either unexplicit or complex to understand) how data are managed by the app [15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%