Google would really like to remind you that all Duo calls are end-to-end encrypted - Android Police
Google would really like to remind you that all Duo calls are end-to-end encrypted - Android Police |
Google would really like to remind you that all Duo calls are end-to-end encrypted - Android Police Posted: 01 Jun 2020 06:47 AM PDT ![]() Since its launch in 2016, Google Duo has used end-to-end encryption for calls, messages, notes, and all kinds of communications carried through it. That encryption is one of the reasons we recommend using Duo to catch up with friends and family, but most users may not be aware of it. Now Google is boasting this privacy-centric approach for everyone to see, and while it's at it, it added the option to send more emojis to your contacts. End-to-end encryption is already mentioned in the app's menu under Privacy in Duo, but most users of the service probably never noticed that or knew about it. That's why Google is starting to display a notice when you're on a call, which clarifies that the communication is secure and encrypted. This should help users feel more safe and trusting of the service, especially when enjoying private talks with their loved ones. Left: Duo's "Privacy" menu already explained this. Right: But now, you'll also see the notice while calling. The second change affects contact pages in the app. You can already send hearts to people, but that appears to be expanding to include more emojis. On my device, some of my contacts only offer the heart card, while others have a scrolling strip with 10 emojis (👋 💖 👍 😘 🙏 🌜 🌞 🔜 😞 ❗️) that you can tap to send. Emojis you send at the same time will be grouped together in a single card. Left: You can only send a heart to some contacts. Middle & Right: But others offer more emoji options . The two features are slowly rolling out to users, likely via a server-side update. Despite being on the latest v89 (APK Mirror) of the app, the encryption notice hasn't showed up on my devices, but the emojis are live in some of my conversations. If you're eager to get any of these, you can grab the APK to make sure the server-side odds are in your favor.
|
Ransomware spoofs COVID-19 contact-tracing app: What to do - Tom's Guide Posted: 24 Jun 2020 10:54 AM PDT ![]() Canadians are being targeted by a new ransomware campaign that pretends to be an official coronavirus contact-tracing app. The ransomware, called CryCryptor and discovered by researchers at cybersecurity firm ESET, infects Android devices and encrypts the files of unsuspecting victims. Online crooks are circulating the ransomware via two websites that claim to offer official contact-tracing services from Health Canada. Created in early June, the ransomware uses source code from programming repository Github. "CryCryptor surfaced just a few days after the Canadian government officially announced its intention to back the development of a nation-wide, voluntary tracing app called COVID Alert," explained ESET's Lukas Stefanko in a blog post. "The official app is due to be rolled out for testing in the province of Ontario as soon as next month." After conducting a detailed analysis of the ransomware, ESET researchers posted a decryption app on Github that allows users to decrypt files breached by CryCryptor. Encrypting all filesStefanko said the ransomware encrypts "all the most common types of files", while a "readme" file containing the crook's email address appears in "every directory with encrypted files". ESET researchers came across the ransomware on Twitter, and after analysing it, they went on to discover a flaw that allows crooks to "launch any exported service provided by the ransomware". Once launched, the ransomware gains necessary permissions to enter files and subsequently encrypts them. However, the phone's screen will not be locked and the device will still be usable. "Selected files are encrypted using AES with a randomly generated 16-character key. After CryCryptor encrypts a file, three new files are created, and the original file is removed," said Stefanko. "The encrypted file has the file extension '.enc' appended, and the algorithm generates a salt unique for every encrypted file, stored with the extension '.enc.salt'; and an initialization vector, '.enc.iv'." When all files have been encrypted, users then see a notification that says "Personal files encrypted, see readme_now.txt". This appears in every compromised file. How to avoid this Android ransomwareTo avoid falling victim to this ransomware, ESET recommends: "On top of using a quality mobile security solution, we advise Android users to install apps only from reputable sources such as the Google Play store." To use ESET's own decryption tool, browse to https://github.com/eset/cry-decryptor/releases and download the file named "CryDecryptor.apk" to your Android phone or to a Mac or a PC. If you downloaded the file straight to an Android device, locate the Downloads folder in a file manager, find the downloaded CryDecryptor.apk and double-click it. Your phone should alert you that this is a suspicious file (that's normal) and will prompt you to change the permissions for the file manager to allow installation of third-party apps. If you downloaded the file to a Mac or PC, you can connect your Android phone to the computer using a USB cable. The computer's file manager should allow you to copy and paste the APK file to a specific location on the Android device, from which you can locate and launch it as indicated above. |
You are subscribed to email updates from "best encryption app for android,should i encrypt my phone,how to unencrypt android" - Google News. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
Comments
Post a Comment