{"id":21346,"date":"2021-07-06T10:55:01","date_gmt":"2021-07-06T05:25:01","guid":{"rendered":"https:\/\/valeurbit.com\/blog\/?p=21346"},"modified":"2021-07-06T10:55:04","modified_gmt":"2021-07-06T05:25:04","slug":"whatsapp-can-be-hacked","status":"publish","type":"post","link":"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/","title":{"rendered":"Is WhatsApp protected? Whatsapp can be hacked? Understanding security in Whatsapp. For the most forgetful"},"content":{"rendered":"\n<p>More than a billion people already use\u00a0WhatsApp messenger.\u00a0With such a huge reach, it is not surprising that people are interested in the security of the program.\u00a0How easy can attackers get too personal correspondence?\u00a0How to protect yourself from such curious people?\u00a0In this article, we will talk about this.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">HOW TO PROTECT WHATSAPP?<\/h2>\n\n\n\n<p>The messenger, being launched on a smartphone, works on it constantly, in the\u00a0background.\u00a0At the same time, there are no ways to password-protect the login in it.\u00a0This means that if your smartphone in an unlocked state fell into the wrong hands, then all yours are now available to the thief.\u00a0The creators of WhatsApp rely on the fact that users are able to block their gadgets using Android or iOS.\u00a0Therefore, the answer to the question &#8220;How to protect my WhatsApp from viewing&#8221; is this: the first thing to do is to set a reliable screen lock.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TWO-STEP VERIFICATION<\/h2>\n\n\n\n<p>Many have heard about this feature, and believe that it was just invented to increase privacy and protect correspondence from prying eyes.&nbsp;This is not entirely true.<\/p>\n\n\n\n<p>The two-step test is designed to verify a new device.\u00a0You can enable this feature in your WhatsApp settings, and you will be prompted to come up with a six-digit secret PIN.\u00a0There will be no more changes.\u00a0The application will continue to run in the background and appear on the screen without any passwords.\u00a0You will encounter a two-step check when you decide to change your gadget.<\/p>\n\n\n\n<p>For example, you bought a\u00a0new smartphone\u00a0and transferred WhatsApp to it.\u00a0The first time you start and try to enter your account (with the old\u00a0phone number\u00a0), the messenger will ask you to enter the PIN.\u00a0The logic here is simple: if someone got access to your smartphone and downloaded everything from there, then he will not be able to launch WhatsApp on his device, because he does not know the code.<\/p>\n\n\n\n<p>Thus, if you use the same smartphone, this function will not help you very much to protect your information, but it will help a lot if it is stolen from you.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DISPLAYING MESSAGES FROM WHATSAPP IN THE BROWSER<\/h2>\n\n\n\n<p>The messenger has an online version.\u00a0This is a website located at web.whatsapp.com.\u00a0This WhatsApp can be run in any browser, both on mobile gadgets and on a stationary computer.\u00a0Working in front of a\u00a0large screen, on a large keyboard, is really more convenient than poking your finger into a small screen of a gadget.<\/p>\n\n\n\n<p>When you go to the website of the web version, you will see a QR code on the monitor screen.\u00a0You have to scan it from your\u00a0mobile version of\u00a0WhatsApp that runs on your smartphone.\u00a0After successful recognition of the code, the computer will show the actual messenger itself.\u00a0And these two versions (stationary and mobile) will be synchronized with each other &#8211; all messages that you send or receive will be simultaneously displayed both on the gadget and on the monitor.<\/p>\n\n\n\n<p>This is precisely the danger.\u00a0If you lose your vigilance and your unlocked smartphone ends up in the wrong hands, then the attacker can immediately launch the web version of the messenger on his laptop (or even smartphone!) And scan the QR code on the screen with your phone.\u00a0This takes less than a minute.\u00a0But now all your correspondence will be synchronized with the web version of WhatsApp running on the hacker&#8217;s device.<\/p>\n\n\n\n<p>True, in Vatsap itself there is a function for monitoring such connections.\u00a0There is a\u00a0WhatsApp Web\u00a0\/ Desktop\u00a0section in Settings\u00a0where you can see everything.\u00a0You only need to tap on the item &#8220;Log out on all computers&#8221;, and all sessions will be forcibly terminated.\u00a0Don&#8217;t forget about it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PROTECTION THROUGH SETTINGS<\/h2>\n\n\n\n<p>As already mentioned, there are practically no functions in the WhatsApp settings to protect the correspondence from the curious.\u00a0But you can still do something.\u00a0For example, you can customize who sees your online status.\u00a0Some users will not be able to understand whether you are online now or not.\u00a0You can also hide the time of the last access to the network.\u00a0The most useful feature is to disable read messages.\u00a0Your subscribers will not know if you saw their messages or not.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">LOST SMARTPHONE LOCK<\/h2>\n\n\n\n<p>Everyone knows about this, but it is worth reminding again: in case of loss of a smartphone, you should inform the\u00a0mobile operator\u00a0as soon as possible\u00a0so that they block the SIM card.\u00a0The\u00a0kidnapper will no longer be able to\u00a0make\u00a0phone calls\u00a0.\u00a0But he can use Vatsap!\u00a0Because the messenger works over a Wi-Fi network, and not through a telephone operator.<\/p>\n\n\n\n<p>Therefore, we will repeat again: do not leave your phone unattended!\u00a0Do not give it to unfamiliar people.\u00a0Come up with a sophisticated screen lock.\u00a0Do not connect to\u00a0public\u00a0Wi-Fi networks unless you are sure they are reliable.\u00a0All these are the simplest rules of Internet hygiene, if you follow them, the likelihood of leaking your correspondence in WhatsApp will be close to zero.<\/p>\n\n\n\n<p>WhatsApp (WhatsApp) is the most popular messenger today for free messaging between smartphone users.\u00a0The program exists for various platforms: iOS, Android, Windows, Blackberry, and even the now-defunct Symbian.\u00a0The program was created in 2009 by Ian Kum and Brian Acton.\u00a0In 2014, Facebook bought it for $ 19 billion.\u00a0But this is, so to speak, prehistory.\u00a0I will teach you how to read someone else&#8217;s correspondence in WhatsApp for free without downloading\u00a0third-party programs, as well as registering and without SMS))) The method is based on social engineering and does not use any third-party and malicious software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">HACKING WHATSAPP<\/h2>\n\n\n\n<p><br>In March 2014, programmer Bas Boschert published instructions on how to hack\u00a0WhatsApp correspondence.\u00a0Its essence was that the program installed on\u00a0the Android device\u00a0stores a database with correspondence in open form, later the creators encrypted this data, but they were also easily decrypted.\u00a0Given the popularity of this program, there is no doubt that there will be many people who want to access their accounts and read other people&#8217;s correspondence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">ADDENDUM REGARDING ENABLING ENCRYPTION IN WHATSAPP<\/h3>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>In April 2016, Jan Kum announced that messages from all WhatsApp users, as well as group chats, were now encrypted using the \u201c\u00a0end-to-end encryption\u00a0\u201d\u00a0method, ie.\u00a0Users&#8217; messages and voice calls cannot be intercepted by third parties (hackers, criminals, security forces, intelligence, etc.) This is certainly all great, but WhatsApp followed the Telegram path.\u00a0I think the catalyst for this decision was the precedent with\u00a0Apple, which was forced by the FBI to\u00a0hack the iPhone of\u00a0terrorists from San Bernardino.<\/p><\/blockquote>\n\n\n\n<p><strong>The method of reading someone else&#8217;s correspondence&nbsp;<\/strong>, which is indicated on this page, is based on the method of social engineering and it does not matter here whether encryption is included in WhatsApp or not.&nbsp;Encryption protects against interception of messages, but not when there is&nbsp;<strong>direct access to the phone&nbsp;<\/strong>.&nbsp;Therefore, in order to protect your WhatsApp account from hacking, always set a password for it (to unlock it or to launch a specific application).<\/p>\n\n\n\n<p>To&nbsp;<strong>enable encryption in WhatsApp&nbsp;<\/strong>anything special you do not need.&nbsp;Update your program to the latest version.&nbsp;In order for a conversation between two subscribers to be encrypted, both interlocutors must have the latest version of WhatsApp installed.<\/p>\n\n\n\n<p>I wrote about encryption separately.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">MY INSTRUCTIONS FOR HACKING WHATSAPP<\/h3>\n\n\n\n<p><br>This is not even a Whatsapp hack in its usual sense.&nbsp;Hacking involves the use of third-party programs, viruses, Trojans, etc.&nbsp;I\u2019ll just teach you how to read someone else\u2019s correspondence.&nbsp;For this, the developers themselves have released such a function as the web version.&nbsp;With certain settings, it can be used for your own selfish purposes.&nbsp;Access to the victim&#8217;s phone is required, at least for 30-60 seconds.<\/p>\n\n\n\n<p>1. The first thing we need is to open our personal PC and go to the page https:\/\/web.whatsapp.com\/ There must be a &#8220;stay logged in&#8221; bird.<\/p>\n\n\n\n<p>2. The second is the phone, the correspondence from which you want to read.\u00a0Open WhatsApp go to the menu and select the WhatsApp Web item.\u00a0It is in this place that those same 30-60 seconds are needed, during which it is necessary to have time to scan the QR code on the computer screen with a smartphone camera.\u00a0The code changes every minute, so there is little time to think.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Important!\u00a0Access to the WhatsApp account, and therefore reading the correspondence, is possible only when the smartphone itself is connected to the Internet.\u00a0If it is offline, there is no synchronization between the phone and the computer.<\/p><\/blockquote>\n\n\n\n<p>This information was written by me purely for information purposes.&nbsp;Take care of your phones or put a password on them, as I do.<\/p>\n\n\n\n<p>To protect your Android smartphone from hacking, which is described above, I recommend installing.&nbsp;With it, you can put a password to launch any application, the same WhatsApp will not start until you enter the correct password.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">HOW TO START A WHATSAPP WEB SESSION ON YOUR PHONE<\/h3>\n\n\n\n<p>Good news, comrades!\u00a0Finally, it became possible to launch a WhatsApp Web session on your phone.\u00a0If earlier, when you tried to open the code scan page in a\u00a0mobile browser,\u00a0you were automatically thrown into the application, now there is an opportunity to bypass this limitation.\u00a0How?<\/p>\n\n\n\n<p>Download an app called Whatscan for Whatsweb from PlayMarket or AppStore.\u00a0Launch it, you will see the usual window for scanning the QR code.\u00a0The application takes over the role of a browser on the computer.\u00a0Having scanned this code from the \u201cvictim&#8217;s\u201d phone, you can read her messages without being tied to the computer, ie.\u00a0directly from the screen of your smartphone.<\/p>\n\n\n\n<p>How well the application works, write in the reviews.&nbsp;So far, this is the only way to read another person&#8217;s WhatsApp correspondence from your phone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">HOW TO FIND OUT PASSWORDS FROM MAIL AND PAGES ON VK AND OK SOCIAL NETWORKS.<\/h3>\n\n\n\n<p>If you want to go&nbsp;<strong>even further&nbsp;<\/strong>and find out other people&#8217;s passwords from accounts on VKontakte, Odnoklassniki, mail, etc.&nbsp;look.&nbsp;The method is 100% working and tested.&nbsp;We read carefully, strictly follow the instructions.&nbsp;We ask questions ONLY after reading.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CHECKING CHANGES WITH GETCONTACT<\/h3>\n\n\n\n<p>The new GetContact app at the end of February is literally \u201c.\u00a0By installing a small program on your phone, you can search for information about unknown numbers from the general database, which is replenished by the same users as you.\u00a0The original idea of \u200b\u200bthe program is to fight spam.\u00a0But if in analogs, users themselves mark this or that number as spam, but GetContact, without asking, pumps out the ENTIRE\u00a0phone book\u00a0into a common database that EVERYONE can see.\u00a0Punching the number you see how it is recorded in the phone books of\u00a0different people.<\/p>\n\n\n\n<p>But what if a man is recorded under a woman&#8217;s name?&nbsp;Or is the woman recorded under the masculine?&nbsp;A reason to think.&nbsp;Learn how to remove yourself from the GetContact database.Buried deep in the settings is the function of displaying active sessions from desktops<\/p>\n\n\n\n<p>For Facebook, the owner of WhatsApp, WhatsApp Web is just an option, but security experts see it as a threat.&nbsp;Through it, users can open the contents of all saved messages in a web browser, read any chat from there, and even send new messages.<\/p>\n\n\n\n<p>However, this opportunity can become a trap: it is enough to leave an unlocked phone unlocked at the workplace for a short time so that an envious colleague can scan a special QR code on web.whatsapp.com with your device.&nbsp;To expose this kind of espionage, open WhatsApp and go to Settings.&nbsp;Here select the line &#8220;WhatsApp Web \/ Desktop&#8221;.&nbsp;You will see a list of active connections.&nbsp;By clicking on the line &#8220;Log out from all computers&#8221; you end all sessions.<\/p>\n\n\n\n<p>To protect yourself from such peeping in the future, turn on a screen lock on your phone.\u00a0After that, you can not be afraid that someone unnoticeably reads the QR-code on the computer with your device and will gain access to the correspondence.<\/p>\n\n\n\n<p>Soomz (soomz.io) for about 600 rubles.&nbsp;offers a set of three covers per camera.&nbsp;With their help, you will secure your device.<\/p>\n\n\n\n<p>In addition, malware can also interfere with your WhatsApp.&nbsp;For example, it allows criminals to secretly take pictures.&nbsp;Use the webcam cover for protection.<\/p>\n\n\n\n<p>This way you can be sure that no manipulations have been carried out with the program and that it will not immediately start sending the contents of messages to web spyware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CHECKING ENCRYPTION KEYS<\/h2>\n\n\n\n<p>When the encryption keys are changed, the\u00a0WhatsApp user\u00a0starts to sound the alarm.<\/p>\n\n\n\n<p>End-to-end encryption is provided for WhatsApp correspondence.\u00a0The keys needed for it are stored directly on the devices.\u00a0With the help of them, WhatsApp encodes information and sends it to the recipient.<\/p>\n\n\n\n<p>Experts, however, have figured out a method to bypass such encryption.&nbsp;They simply change the key on the recipient&#8217;s device so that they can read the message in a man-in-the-middle attack.<\/p>\n\n\n\n<p>The messenger settings are to blame for the fact that the user has neither a rumor nor a spirit about it.\u00a0Facebook prioritizes comfort over safety and does not advertise changes.\u00a0However, it is possible to activate notifications about the change of the used key.\u00a0She hides in the settings.<\/p>\n\n\n\n<p>notification about the lack of encryption, the corresponding function must be enabled in the settings<\/p>\n\n\n\n<p>To enable notifications, launch WhatsApp and go to Settings.&nbsp;From there open \u201cAccount |&nbsp;Safety&#8221;.&nbsp;Activate the option &#8220;Show security notifications&#8221;.<\/p>\n\n\n\n<p>If the recipient&#8217;s key then changes, you will know.&nbsp;However, such a change does not necessarily indicate an attack.<\/p>\n\n\n\n<p>It is likely that the recipient simply linked their\u00a0new phone\u00a0to their WhatsApp account\u00a0.\u00a0And in this case, the encryption code will be different.\u00a0When in doubt, the easiest way is to ask the other person what happened.<\/p>\n\n\n\n<p><strong>Encryption for all users<\/strong><\/p>\n\n\n\n<p>WhatsApp, a subsidiary of Facebook, has enabled end-to-end encryption of messages for all users of its messenger, Wired reported.&nbsp;Encryption applies to any data, be it text messages, images, video, audio or voice calls &#8211; and it works, including in group chats.<\/p>\n\n\n\n<p>WhatsApp is the most popular messenger in the world, which introduced end-to-end encryption.\u00a0The\u00a0messenger Telegram\u00a0<strong>Pavel Durov\u00a0<\/strong>this feature was present initially.\u00a0Telegram has an\u00a0active audience of\u00a0about 100 million users, while WhatsApp has about 1 billion. The only messaging service in which the number of users exceeds 1 billion is Facebook, which has an audience of 1.5 billion people.<\/p>\n\n\n\n<p><strong>End-to-end encryption<\/strong><\/p>\n\n\n\n<p>End-to-end encryption means that the message is encrypted all the way from sender to receiver.&nbsp;The key, with which the message can be decrypted, is only with the addressee.&nbsp;WhatsApp does not own it, that is, it will not be able to transfer it to the authorities, even if they insist on it.<\/p>\n\n\n\n<p><strong>Phased introduction of technology<\/strong><\/p>\n\n\n\n<p>Encryption in WhatsApp came in stages.&nbsp;In 2014, the company equipped its Android app with end-to-end encryption.&nbsp;Thus, since 2014, users have already exchanged encrypted messages, but only within the same platform.<\/p>\n\n\n\n<p><strong>End-to-end encryption is now available to all WhatsApp users<\/strong><\/p>\n\n\n\n<p>Now it has become available to owners of devices\u00a0running\u00a0iOS,\u00a0Windows Phone, Nokia S40, Nokia S60, BlackBerry OS and BlackBerry 10. To take advantage of the new feature, you need to install the\u00a0latest version of\u00a0the WhatsApp application.<\/p>\n\n\n\n<p><strong>Authentication<\/strong><\/p>\n\n\n\n<p>WhatsApp users who have installed the latest version of the client will have access to the option to authenticate the interlocutor.\u00a0To do this, you will need to compare the digital code on your screen and the code on the interlocutor&#8217;s screen or let the interlocutor use the camera on the\u00a0mobile device to\u00a0read the QR code from the screen of the user initiating the connection.\u00a0After that, a note will appear in the chat that the connection is fully encrypted.<\/p>\n\n\n\n<p><strong>WhatsApp has become the largest messenger with end-to-end encryption<\/strong><\/p>\n\n\n\n<p><strong>Protocol used<\/strong><\/p>\n\n\n\n<p>WhatsApp&#8217;s partner in implementing the\u00a0new feature\u00a0was Open Whisper Systems, the developer of the\u00a0Signal\u00a0mobile app,\u00a0Edward Snowden&#8217;s\u00a0favorite messenger, who in 2013 handed over to journalists a large number of classified documents revealing the often illegal activities of the\u00a0US\u00a0National Security\u00a0Agency, in which he worked as a system administrator.<\/p>\n\n\n\n<p>Encryption in Signal &#8211; and now in WhatsApp &#8211; is based on the Signal Protocol.&nbsp;It is an open source asynchronous protocol.&nbsp;It, in turn, was created based on the Off-the-Record (OTR) Messaging Protocol.&nbsp;One of the key properties of OTR &#8211; and, as a consequence, Signal Protocol, is the so-called &#8220;forward secrecy&#8221;, which is also called &#8220;perfect forward secrecy&#8221; (perfect forward secrecy).<\/p>\n\n\n\n<p>Unlike the popular\u00a0email\u00a0encryption protocol\u00a0PGP, for example,\u00a0in which messages are encrypted over and over with the same public key, forward secrecy uses new keys for each session.\u00a0Therefore, if someone records encrypted traffic for years in the hope of decoding it one day, in the case of forwarding secrecy, they are doomed to fail.<\/p>\n\n\n\n<p>Open Whisper Systems is the developer of the Signal messenger and the secure communication protocol of the same name, which is also used in WhatsApp.&nbsp;In her blog, the presence of a vulnerability in WhatsApp and explained the recent, a feature of the implementation of the Signal protocol, namely the mechanism for authenticating the participants in the correspondence.<\/p>\n\n\n\n<p>WhatsApp, like all Signal-based systems, uses asymmetric encryption (public and\u00a0private key\u00a0) to protect communications.\u00a0This encryption\u00a0works as follows:<\/p>\n\n\n\n<ul><li>A public and private key is generated on your device.\u00a0Using the public key, it is possible to encrypt a message, but only the owner of the private key can decrypt the message.<\/li><li>Your\u00a0public key is\u00a0distributed through the WhatApp server to all your contacts, in the same way, you receive the public keys of all your contacts.\u00a0The private key remains only on your device.<\/li><li>Thus, the person with whom you are communicating encrypts the message intended for you with your public key, only you can decrypt it, because the private key is only on your device.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">MAN-IN-THE-MIDLE ATTACK<\/h3>\n\n\n\n<ul><li>When using End-To-End encryption, it is important to make sure that your contacts have the correct public keys (received from you), otherwise no one prevents the attacker from introducing himself as you, providing your interlocutor with his public key, receiving messages intended for you and forwarding them using your public key.&nbsp;This attack is called man-in-the-midle.<\/li><li>To exclude the possibility of such an attack against you, you need to make sure that the contact with whom you are texting uses your public key to encrypt messages, and you, in turn, use your interlocutor&#8217;s public key.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">HOW TO VERIFY WHATSAPP SECURITY KEYS<\/h3>\n\n\n\n<p>To perform such a check, WhatApp provides a mechanism for matching keys based on a QR code.<\/p>\n\n\n\n<p>When meeting in person with your interlocutor, open his WhatsApp profile and select the\u00a0<strong>Encryption\u00a0<\/strong>section\u00a0, to verify the public keys, scan the QR code of your interlocutor, and in the meantime he will scan yours.\u00a0Unfortunately, this will have to be done with every contact.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">HOW TO RECEIVE WHATSAPP SECURITY NOTIFICATIONS<\/h3>\n\n\n\n<p>To receive security notifications, in particular, that the\u00a0secret code of\u00a0your interlocutor has changed.<\/p>\n\n\n\n<ol><li>Open WhatsApp and click on&nbsp;<strong>Settings&nbsp;<\/strong>.<\/li><li>Click on&nbsp;<strong>Account&nbsp;<\/strong>and select&nbsp;<strong>Security&nbsp;<\/strong>.<\/li><li>Here you can enable security notifications by selecting&nbsp;<strong>Show security notifications&nbsp;<\/strong>.<\/li><\/ol>\n\n\n\n<p>Now, if someone tries to change your public key or your interlocutor, you will receive a notification about this.<\/p>\n\n\n\n<p>This is an excuse to stop communicating and reconcile the keys at a personal meeting, perhaps one of you changed your phone or they are trying to wiretap you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than a billion people already use\u00a0WhatsApp messenger.\u00a0With such a huge reach, it is not surprising that people are interested in the security of the program.\u00a0How easy can attackers get too personal correspondence?\u00a0How to protect yourself from such curious people?\u00a0In this article, we will talk about this. HOW TO PROTECT WHATSAPP? The messenger, being launched&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is WhatsApp protected? Whatsapp can be hacked? Understanding security in Whatsapp. For the most forgetful | ValeurBit Infosec<\/title>\n<meta name=\"description\" content=\"More than a billion people already use WhatsApp messenger. With such a huge reach, it is not surprising that people are interested in the security of the program.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is WhatsApp protected? Whatsapp can be hacked? Understanding security in Whatsapp. For the most forgetful | ValeurBit Infosec\" \/>\n<meta property=\"og:description\" content=\"More than a billion people already use WhatsApp messenger. With such a huge reach, it is not surprising that people are interested in the security of the program.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"ValeurBit Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/valeurbitinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-06T05:25:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-06T05:25:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:site\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\",\"name\":\"Valeurbit Infosec\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/valeurbitinfo\/\",\"https:\/\/www.instagram.com\/valeurbit\",\"https:\/\/www.linkedin.com\/company\/valeurbit-infosec\/\",\"https:\/\/twitter.com\/valeurbit\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"contentUrl\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"width\":1080,\"height\":512,\"caption\":\"Valeurbit Infosec\"},\"image\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"name\":\"ValeurBit Infosec\",\"description\":\"Cyber Security Company\",\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/valeurbit.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/#webpage\",\"url\":\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/\",\"name\":\"Is WhatsApp protected? Whatsapp can be hacked? Understanding security in Whatsapp. For the most forgetful | ValeurBit Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\"},\"datePublished\":\"2021-07-06T05:25:01+00:00\",\"dateModified\":\"2021-07-06T05:25:04+00:00\",\"description\":\"More than a billion people already use WhatsApp messenger. With such a huge reach, it is not surprising that people are interested in the security of the program.\",\"breadcrumb\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/valeurbit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is WhatsApp protected? Whatsapp can be hacked? Understanding security in Whatsapp. For the most forgetful\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/#webpage\"},\"author\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\"},\"headline\":\"Is WhatsApp protected? Whatsapp can be hacked? Understanding security in Whatsapp. For the most forgetful\",\"datePublished\":\"2021-07-06T05:25:01+00:00\",\"dateModified\":\"2021-07-06T05:25:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/whatsapp-can-be-hacked\/#webpage\"},\"wordCount\":3327,\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"articleSection\":[\"Valeurbit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\",\"name\":\"ValeurBit\",\"sameAs\":[\"https:\/\/valeurbit.com\/blog\"],\"url\":\"https:\/\/valeurbit.com\/blog\/author\/valeurbit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21346"}],"collection":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/comments?post=21346"}],"version-history":[{"count":1,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21346\/revisions"}],"predecessor-version":[{"id":21347,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21346\/revisions\/21347"}],"wp:attachment":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/media?parent=21346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/categories?post=21346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/tags?post=21346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}