Viber, a competitor to WhatsApp, has also just release that they have implemented end-to-end encryption for its’ 7 million subscribers (Conger, 2016).  The COO, Michael Shmilov, announced that the encryption being used by Viber will only allow the communicating party to see the messages, and that the company does not have access to the content of the message sent using its’ app. The company does have the visibility to see the phone numbers of the party communicating. A Viber spokesperson did tell TechCrunch that “MD5 is not being used”, and that “Viber will not grant backdoor access under any circumstance and in and country” (Conger, 2016). Viber has taken the side of Apple and WhatsApp.

One thing that is troubling many is that Viber has yet to publish any information on how they plan to encrypt messages or which type of encryption that they will use. Joe Hall, the chief technologist of the Center for Democracy and Technology, is concerned that these companies are to quick to use encryption that they may not be completely securing the technology the way they should (Conger, 2016). “In the rush to encrypt everything, I’m hoping encryption doesn’t become just a fad, resulting in poor security engineering. It’s not clear if that’s what’s happening here, but I suspect we’ll see that at some point,” Hall told TechCrunch (Conger, 2016).

What is the government going to do with this growing encryption retaliation? Before we know it the National Deficit will increase by another trillion dollars because the government is suing every company in America that uses some type of encryption. Should the general public be worried about this? On a daily basis citizens use passwords to access information, encryption is used when logging into many business websites to purchase items, to check banking information, or even encrypting data so that spies on public networks are not stealing their data. The government forcing corporate entities to give up their encryption security so that the government can get information from one persons phone is the correct approach. While getting the information for this one device, they are creating a vulnerability in every device that uses the same type of security.

Grant Ryan

Conger, K. (2016, April 20). Viber defends new end-to-end encryption protocol against criticism. Retrieved from