Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label encrypted. Show all posts

X Temporarily Disables Encrypted DMs to Launch New Messaging Features

 

X, formerly known as Twitter, has announced a temporary suspension of its encrypted direct messaging (DM) feature as it works on major upgrades to its messaging infrastructure. In a recent update, the platform confirmed that users will still be able to access previously sent encrypted messages, but the ability to send new ones has been paused until further notice. The decision reflects ongoing backend improvements aimed at expanding the platform’s messaging capabilities. 

The move comes as X accelerates its efforts to position itself as an all-in-one communication platform, integrating functions typically found in dedicated messaging apps. Elon Musk, owner of X, has consistently emphasized the importance of message encryption as part of this broader transformation. Alongside encryption, the company has also been working to introduce features such as video messaging, voice calls, file sharing, disappearing messages, and more—many of which are commonly found in platforms like WhatsApp and Telegram. 

While X hasn’t confirmed a launch timeline, there has been speculation that the revamped messaging platform will be branded as “XChat.” Early glimpses of these features have already surfaced in test environments, but a complete rollout has yet to take place. These potential upgrades aim to deliver a more modern, secure, and multi-functional experience for users communicating within the app. Just last month, an X engineer noted that the entire DM system is undergoing a complete code rewrite. The goal is to deliver a more chat-like interface that is robust, scalable, and aligned with future functionalities. This redevelopment may also be tied to X’s longer-term ambition to support in-app payments and money transfers. 

A fully encrypted, streamlined messaging system would be a foundational step in enabling those financial features securely. Although the platform has not shared detailed documentation or a public roadmap, the encryption pause signals a broader overhaul underway. X has become known for rolling out updates with minimal pre-release information, often making changes live as development progresses. That said, given the significance of encryption in any secure communication tool, it’s expected that this feature will return as part of a larger suite of upgrades.  

For now, users should be aware that while their encrypted DMs remain viewable, they cannot send new encrypted messages. A follow-up announcement is anticipated in the near future, likely marking the launch of the redesigned messaging platform—possibly XChat—that combines privacy, functionality, and potentially even payments, into one seamless experience.

ProtectEU and VPN Privacy: What the EU Encryption Plan Means for Online Security

 

Texting through SMS is pretty much a thing of the past. Most people today rely on apps like WhatsApp and Signal to share messages, make encrypted calls, or send photos—all under the assumption that our conversations are private. But that privacy could soon be at risk in the EU.

On April 1, 2025, the European Commission introduced a new plan called ProtectEU. Its goal is to create a roadmap for “lawful and effective access to data for law enforcement,” particularly targeting encrypted platforms. While messaging apps are the immediate focus, VPN services might be next. VPNs rely on end-to-end encryption and strict no-log policies to keep users anonymous. However, if ProtectEU leads to mandatory encryption backdoors or expanded data retention rules, that could force VPN providers to change how they operate—or leave the EU altogether. 

Proton VPN’s Head of Public Policy, Jurgita Miseviciute, warns that weakening encryption won’t solve security issues. Instead, she believes it would put users at greater risk, allowing bad actors to exploit the same access points created for law enforcement. Proton is monitoring the plan closely, hoping the EU will consider solutions that protect encryption. Surfshark takes a more optimistic view. Legal Head Gytis Malinauskas says the strategy still lacks concrete policy direction and sees the emphasis on cybersecurity as a potential boost for privacy tools like VPNs. Mullvad VPN isn’t convinced. 

Having fought against earlier EU proposals to scan private chats, Mullvad criticized ProtectEU as a rebranded version of old policies, expressing doubt it will gain wide support. One key concern is data retention. If the EU decides to require VPNs to log user activity, it could fundamentally conflict with their privacy-first design. Denis Vyazovoy of AdGuard VPN notes that such laws could make no-log VPNs unfeasible, prompting providers to exit the EU market—much like what happened in India in 2022. NordVPN adds that the more data retained, the more risk users face from breaches or misuse. 

Even though VPNs aren’t explicitly targeted yet, an EU report has listed them as a challenge to investigations—raising concerns about future regulations. Still, Surfshark sees the current debate as a chance to highlight the legitimate role VPNs play in protecting everyday users. While the future remains uncertain, one thing is clear: the tension between privacy and security is only heating up.

NSA Issues Guidelines for Eliminating Obsolete TLS Protocols

 

The National Security Agency is a US-based agency on which America highly relies on to collect and process foreign signals, understand them and share them with US Officials, and to take any action against dubious acts. These signals are not comprehensible by common men instead a team of mathematicians, technical experts, or analysts is required to decode the encrypted signals to comprehensible format. 

The NSA has distinctly recommended replacing antiquated protocols configuration of TLS (Transport Layer Security). This has been done because of the obsolete protocols that were harming the sensitive information of those using it. With time new deleterious dimensions of the TLS authentication and configuration have been discovered by the NSA. Such flaws are not acceptable as they breach the wall of privacy between the client and the server by incapacitating the encrypted data that is easily accessible by the hackers. 

The exchange of communication between the server and the client is sensitive information and valuable data that needs protection and for this purpose, strong protection channels and electronic systems like TLS and Secure Sockets Layer (SSL) were developed. 

Considering TLS, it’s a protocol to secure communication between the client and the server. It uses encrypted signals and authentication to protect the information. Nevertheless recently some new attacks against TLS and its authentication have been discovered. Network connections employing obsolete protocols are at an elevated risk of exploitation by the opponents. For the aforementioned sitch, the NSA has issued strict guidelines that need to be enforced as soon as possible. They claimed that the obsolete and incapacitated TLS protocol implementation was being observed recently, which is a threat to the country’s intelligence. Furthermore, they stated, “nation-state of sufficiently resourced actors are able to exploit these weak communications”. 

As a solution, the NSA recommended that only TLS 1.2 and TLS 1.3 should be used and that SSL 2.O , SSL 3.0 , TLS 1.0, and YLS 1.1 should not be used. They said that all the TLS implementations should be up to date and configuration should be in accordance with the CNSS and NIST guidelines. 

NSA urged the public to follow the guidelines and implement the new TLS protocol as they are familiar with the dangerous consequences of using obsolete encryptions which includes delivering a false feeling of security because of a distorted sense of trust we have in the functioning of the system. However, updating the TLS protocols and configuration will be in our best interests as it will now provide stronger encryption and authentication.