Twitter’s encrypted DM feature is a mess, and you shouldn’t trust it

Twitter recently launched a new feature for Twitter Blue users: encrypted DMs. But it is still far from being a refined product, which Twitter CEO Elon Musk and the company fully admit. An official quote from Twitter states: .stk-050a192{box-shadow:0 0 0 2px rgba(120,120,120,0.1) !important}.stk-050a192-container{background-color:#f3f3f3 !important}.stk-050a192-container:before{background-color:#f3f3f3 !important} .stk-fff85bd{margin-left:-20px !important}.stk-fff85bd .stk–svg-wrapper .stk–inner-svg svg:last-child{opacity:0.7 !important}.stk-fff85bd .stk–svg-wrapper .stk–inner-svg svg:last-child,.stk-fff85bd .stk–svg-wrapper .stk–inner-svg svg:last-child :is(g,path,rect,polygon,ellipse){fill:var(–stk-global-color-56583,#911d9c) !important} .stk-75422ff{margin-left:-17px !important}.stk-75422ff .stk-block-text__text{font-size:16px !important;font-weight:300 !important;font-style:normal !important;font-family:”Golos Text”,Sans-serif !important}@media screen and (max-width:1023px){.stk-75422ff .stk-block-text__text{font-size:16px !important}}Currently, we do not offer protections against man-in-the-middle attacks. As a result, if someone – for example, a malicious insider, or Twitter itself as a result of a compulsory legal process – were to compromise an encrypted conversation, neither the sender or receiver would know. Early version of encrypted direct messages just launched.Try it, but don’t trust it yet.— Elon Musk (@elonmusk) May 11, 2023 Public and private keys are required to access encrypted messages, like Twitter’s encrypted DMs. Unfortunately, this method isn’t perfect, and people have discovered vulnerabilities like man-in-the-middle attacks. A man-in-the-middle attack (MITM) is a cyberattack in which attackers secretly relay and possibly alter the communications between two parties. These people believe they are directly communicating with each other. However, the attacker is still able to read the contact. .stk-c9d4ff0{padding-top:0px !important;padding-right:0px !important;padding-bottom:0px !important;padding-left:0px !important} .stk-5206ba4{padding-top:8px !important;padding-right:32px !important;padding-bottom:8px !important;padding-left:32px !important} .stk-f6f49c3 .stk-block-heading__text{font-size:17px !important}@media screen and (max-width:1023px){.stk-f6f49c3 .stk-block-heading__text{font-size:17px !important}}Man-in-the-middle (MITM) example .stk-0b069eb-container{padding-top:0px !important;padding-bottom:8px !important} .stk-dc710cd .stk-block-text__text{font-size:15px !important}@media screen and (max-width:1023px){.stk-dc710cd .stk-block-text__text{font-size:15px !important}}Imagine you and your friend are talking on walkie-talkies, but a hacker in the middle listens to…Twitter’s encrypted DM feature is a mess, and you shouldn’t trust it

Leave a Reply

Your email address will not be published. Required fields are marked *