#spy sms forwarding android
Explore tagged Tumblr posts
Text
How to Track Any Cell Phone Location
Would you like to monitor the location of someone through their mobile phone? You may have your own reasons for doing so. For parents, to ensure their safety, they would like to know about the location of their children. They would want to monitor the whereabouts of their partners to get peace of mind for couples who question each other.
Using this recommended app is the easiest way to do it. Find out in detail.
Section 1: How to Track Cell Phone Location Effectively
There are several providers of location tracking apps out there and it is advised to choose the appropriate one as you may also come across some illegal ones attempting to hoax you. If you are looking for a reliable mobile phone location tracking app, Minspy is a top choice.
Minspy is a leading solution for mobile phone location monitoring/tracking and suitable for home and skilled users with industry-leading services. The app has come a long way since its launch and is now considered to serve millions of consumers across 190 countries.
The brand is credible and trusted, has over a decade of specific experience in the area of telephone surveillance and spying. To top it off, Minspy was also featured in the Wall Street Journal, Forbes, BBC, and many other major outlets.
You get access to a myriad of benefits when you use Minspy to monitor the live GPS location of a particular cell phone or phone number. In addition, the app has been built with loads of features that aim to enhance the overall experience of the user.
Now, let us help you unravel Minspy’s vital features and benefits that allow you to immediately get the idea of anyone’s phone location tracking plus other information. We’re sure you’ll agree with us after reading this article that not many other apps can compete with this phone location tracker.
Section 2: Minspy — The Cell Phone Tracker Offering Wide Spectrum of Features
One of the great things about Minspy is that it runs on Android and iOS devices well. What that means is that regardless of whether your child or partner is using an iPhone or an Android phone. You can find their location any time you wish to. All it requires is the iCloud credentials of the target to sync with their iCloud backup and to update data in real-time. No jailbreak required. Easy direct installation and use.
Coming to the more interesting section now, what can Minspy really do?
You can access the following features after you have registered, installed the app, and signed into your online dashboard:
> SMS & Call Tracking — With Minspy, in addition to the timestamps for full transparency, you will get unrestricted access to all the exchanged text messages. It is also able to fetch information for previously deleted messages.
This app also helps you to view the target’s contact book with all the call logs to top it all up Plus the duration of every call.
> Multimedia File Access — You can get access to the whole collection of multimedia files that are present on the target phone using Minspy. Not only does the app allow you to view the files that are shared on social media apps, but it can also help to recover the photos deleted.
> GPS Location Tracking — Minspy comes equipped with an advanced tracking feature for GPS location and allows you to track the device around the clock via its live location. It is also able to provide access to the streets in groundbreaking 3D view. This helps to get a better view of the area in which your target will be located.
> Social Platform Hacking — You get access to an online dashboard when you register with Minspy that allows you to track various social media accounts that are used by the target. Whether it is WhatsApp or Facebook, Instagram, Telegram, Snapchat, or more, with the aid of a single click, Minspy allows you to hack and monitor all the information provided.
> Tracking of Website Browsing History — The app lets you access the website browsing history that is saved on the target phone. This helps to give you access to the History section of the web browser in question. You will know about the secret interests that may never have been told to you with this feature.
Meanwhile, are you in need of professional investigators? Have the best, most discrete and professional hackers solve whatever concern you have, be it; Email hack, SMS interception, track an individual, uncover a cheating partner, and many more. Visit cyb4rgeek.xyz or send an email to [email protected] for easy and hassle-free investigation.
Section 3: Minspy Packs a Bunch of Powerful Benefits
Of course, It's normal to have some concerns about the security aspect of the app, Here are a few points that will bring your mind to rest.
You can leverage Minspy without requiring any technical knowledge or prior training. You can pick up its working easily.
You can remain worry-free about the overall threat of thefts. The app is known to NOT save any monitored data on its servers, and thus, nothing can get leaked.
It’s not expensive to use Minspy’s features. The purchase of a single subscription provides you access to over 35 specialized features of the app.
Minspy provides access to a free live demo such that you can go forward with testing its working while getting a feel of the app before you make the purchase.
The app operates remotely 100%. This allows you to use it without installing anything on your computer or mobile.
All data on the target device gets displayed on the dashboard. You can log into the same with the help of any web browser. The dashboard is known to contain one-click panels for carrying out all types of monitoring.
2 notes
·
View notes
Text
Best Cell Phone Spy Apps
An Easy 2021 Step-by-Step Guide On How To Spy On Any Android or iPhone This is the newbie's guide to how to spy on a cellular phone in 2021. In today's market, there are basically two kinds of cell phones, Androids and iPhones. Android gadgets without a doubt comprise the majority of mobile phones presently on the market with iPhone being available in 2nd. This quick guide will show you how to spy on both quickly and quickly. How to Spy on a Cell Phone Using Cell Phone Spy Software highster mobile evaluation Auto Forward Spy for Android Cell phones are relatively simple to keep track of. Many cellular phone security systems have vulnerabilities which enable anybody to utilize to mobile phone tracking software application without the user ever understanding. After establishing a remote connection with the Android gadget using the Auto Forward mobile phone spy app, details from the monitored device will submit to your control board. You will be able to see essentially whatever that occurs on the cell phone from within your User Control Panel. You can keep track of the target gadget anywhere, anytime, as long as you have an internet connection. The installation procedure is quite simple. After purchasing the program, you will get an email that contains your username, password, and license secret (your password and license key are the same). You can download the app through an OTA (over the air) link. After the download is complete, you have to enter your license key, the phone number of the target device, and a few taps of the activation key. There are 3 basic actions to using this app: 1. Download-- Use the OTA (over-the-air) link to download the app to the phone you want to monitor. 2. Trigger-- Enter the license secret they send you to activate and the target phone number. 3. Monitor-- From your cell phone, tablet, or computer, view texts, calls, GPS, and all available information from the target phone. Once installed, you can keep track of a mobile phone from your web linked gadget. The important thing to remember when utilizing this type of software application is that it's not rocket science. If you just take your time and listen to the directions, it really is quite easy. Vehicle Forward Spy includes video tutorials and written instructions, which makes it rather basic to install and use. Even the most technically challenged person can be successful utilizing Auto Forward. Automobile Forward Spy for iPhone Along with Androids, iPhones and iPads can also be easily spied on. Unlike Android Spy Software, you do not need to have physical belongings of iPhone to monitor the target gadget. With Auto Forward Spy software, remote setup and monitoring can be achieved. That makes Auto Forward the best spyware for iPhone anywhere! Auto Forward works without jailbreaking You will not require to have ownership of or access to the iPhone to utilize this program. It really depends on what is readily available from the phone. All you require to do is get in the Apple ID and password of the device you desire to monitor, and the program will draw out info from that gadget. I like understanding that if I had an issue, their technicians are only a phone call away. No iCloud Locking A big problem with all other iPhone spy systems is iCloud locking. Another reason why Auto Forward Spy is the finest spyware for iPhone is its capability to avoid iCloud locking. Jailbreak variation If you are a person who will not have access to the phone you desire to monitor, there is no way you will be able to use this program. It is for this factor that I warn you not to waste your cash unless you know for sure you will be able to acquire access to the target phone long enough to jailbreak it and set up the program. The setup of the program takes only 2 to 3 minutes. I have actually personally spent approximately 10 to 15 minutes at times trying to jailbreak an Apple gadget. Here's Why You'll Love This Cell Phone Spy Guide Newbie Friendly-- The guide is not technical, and is easy to use and really comprehensive. Quick Setup-- You'll be spying on a cell phone within minutes. Up-to-date-- I routinely update this guide to keep up with the latest software. Numerous Uses-- I cover Android Spy and iPhone Spy Software. " I knew absolutely nothing when it came to cell phones. I'm lucky I'm able to read my email on my cell phone. Jay's instructions made it possible for me to monitor my kids phones. android spy

Reasons You May Need A Reliable Cell Phone Spy Software In 2020 Before you do anything, you've got to decide what you wish to get by spying on a cell phone. Are you tracking an enjoyed one? Monitoring your kid? Monitoring a worker? This will identify the software application you select to perform your project. Spying on a Loved One Depending on your situations, you might have currently chosen that you require to see what your liked one depends on and who she or he is how to spy on a cell phonein communication with on their cellular phone. Learning how to spy on a mobile phone from another location can certainly be useful in a scenario like this. Text messages are the most popular means of interaction these days among people who want to stay discreet. You will want a program that is known for its exceptional capability to gather text. More important is the capability of the program to draw out deleted and old text messages from a cellular phone. A program that can do this is worth its weight in gold. Deleted text messages stay on the phone till they are overwritten by another piece of information. This can sometimes take months to take place. The text messages can be retrieved from the phone during that time. Monitoring your Child Anyone who has a teenager understands how challenging sometimes they can be. Teenagers have a huge tendency to get and do ridiculous things in trouble. They might likewise get included with the wrong crowd.android spy Accountable, caring moms and dads many times make use of the power of mobile spy software to keep tabs on their kids and monitor their activities. For moms and dads, the GPS tracking function of these programs can be very beneficial. The GPS tracking feature of any good Android spy app will permit you to see the place of your kid's cell phone to within 50 feet of its real area and will report this information every 5-10 minutes. Supervise an Employee Worker theft and efficiency is a constant problem amongst companies. If you believe one or more of your employees of misconduct, you will gain from remote cellular phone spy apps.android spy Most mobile phone spyware programs are equipped with GPS trackers that will allow you to track a workers movements and location in 5 to 10 minutes intervals. You do not need the physical device to see its place on Google Maps. How to Spy on a Cell Phone STEP ONE: Pick the Best Cell Phone Spy Software Believe it or not, this is the most tough part. Selecting a good cell phone spyware company is not an easy job. There are numerous programs claiming to do lots of jobs. Their claims range from mildly unbelievable to the completely outlandish! Some products declare to have the ability to spy on cell phone without having access to the phone. And others will tell you that it is possible to spy on a cell phone without setting up software application to the phone you want to spy on. Is this possible? Yes, it is, however, more on that later on. With customer variations of iPhone and Android spy apps, you will wish to find a program that works and a company that supports their program. Depending upon your requirements, you will desire a program with these "bare bones" features: Seeing Text messages (erased and new). Access to Call Log GPS Tracking Social Media Monitoring (Facebook, Twitter, Instagram, Snapchat, and so on). These are the most important and usable functions for lots of people, as I have seen. For text messages, you will wish to choose a program that can find and extract old and deleted texts, and SMS from a mobile phone. Makes certain to not ignore this extremely crucial feature. It is common for somebody to erase their text messages, whether inadvertently or due to the fact that they're hiding something. The company you pick to purchase your iPhone or Android spy app from ought to have the following functions available to its customers: Phone number with REAL people responding to. Make certain to ask particular questions regarding the product. Numerous companiesandroid spysatisfaction study employ addressing services that will not be able to effectively address your questions. An indication of a legitimate business is one that has their own telephone support team. Tech Support: For the majority of people, utilizing this type of software application will need additional assistance. Some business have e-mail support, which is good, but often it's necessary to get someone on the phone. A few companies offer Premium Support, which may cost a couple of extra dollars, but it's worth it! Refund policy: If you're not satisfied with the software, make certain you can get your money back. Where Can I Get a Good Spy Software? For this guide, I used the Auto Forward Spy app for my remote cellular phone android spy software application. Car Forward is one of the very best spy apps on the market and uses the best bang for the buck! It consists of every useful spy feature possible. It only costs $69.99 (one-time payment, of course), and you can likewise test this iPhone and Android spy software with their Free Trial. They're really inexpensive, have great consumer support, and the program includes complimentary lifetime upgrades-- so it's worth checking them out. STEP TWO: Set up and Use Your Program Now that you have selected the very best spy app for your requirements, it is time to install and start android spycollecting information. KEEP IN MIND: This treatment is for Android phones and mobile devices. With a lot of spy apps, a couple of settings should be correctly set and the target phone need to be configured. This is not nearly as complicated as it sounds and will just take a couple of minutes. Keep in mind, you'll want to make certain you do everything correctly so you do not need to do it again. 3 settings you will need to inspect: Allow from Unknown Sources-- Check this settings box so the Android gadget can accept apps downloaded from sources aside from Google Play. Disable Verify Apps-- Check this box to permit the Android gadget to bypass app confirmation from Google Play. GPS Settings-- Normally, having the GPS area on is just needed for Verizon devices in the U.S. The Google Map place can be shown as long as these settings are altered. To get social media details, e-mails, and other choose data from an Android device, sometimes, it will be necessary to root the device. Now that you have actually properly set up the settings-- I informed you it wasn't going to be that tough-- you can move onto installing the app to your phone. How to Install your Android Spy Program Action 1 Go to the Home Screen of the Android phone and locate the internet web internet browser icon. On many Android gadgets, it will be Google Chrome and the icon will look like this: android spy Action 2 Locate the address bar-- not the search bar-- of the web browser. Just swipe from the top of the screen to access the search bar. Once the address bar appears, you will require to get in the unique code, or URL, you received when you acquired the program. Beware to go into the URL precisely as it appears. If you misspell it or enter it into the search bar, you will get an error message like this: 404 the page you are attempting to gain access to does not exist After you have actually correctly entered the URL, tap GO and the app will begin to download. Action 3 When the Android spy app has downloaded, you can access the downloaded file one of two methods: The very first is by swiping below the top of the Home Screen, which will show all downloaded files. Simply tap the file you simply downloaded and the app will start to install. The second is to go to the Downloads folder on the Android gadget, locate it, and tap on it there. Similar to the first option, the app will start to download. android spy Step 4 Depending upon the Android gadget you are using, it may be necessary to tap the "Install" or "Accept" button a couple of times. With a lot of installation process choices, it's impossible to explain all of them to you. Each manufacturer of Android OS devices can execute their own UI (interface). So, each UI makes the setup procedure somewhat different. The choices to be made are quite simple so, you won't have much of a problem. Step 5 After you get done moving through the download and initial setup stage, you will require to go into the license key or activation code that will trigger your software and allow communication between the mobile phone and the spyware app server. Software designers use license secrets to safeguard their software application from piracy and to safeguard you from the illegal gain access to of your private information. The license key develops a protected connection between the mobile phone to which it is set up and the remote mobile phone spy server that receives the info from that device. The remote server organizes the information got and displays on the screen of your cell phone, computer, or tablet. Without the remote connection, spying on a smart phone would not be possible. android spy Step 6 Depending upon the Android spy software you acquired, you might only need to enter the telephone number of the phone you want to spy on in the section directly below the license key field. When going into the target device phone number, it should be gotten in utilizing the location code and telephone number. You will require to enter the nation code from which the phone is signed up if the phone will be out of the country. Example: If the phone you are spying on is signed up in the US, you would get in the number like this: +1 -222 -333 -4444. +1 is the country code for the United States. For a full list of country codes, you can go to Countrycode.org. Entering the phone number of the phone you're spying on will enable you to accurately track the phone. Together with seeing all the info from your mobile phone without getting baffled about which calls and texts are from who. Action 7. Following the input of the license key and telephone number, you will receive a message that states whether the installation and activation has actually succeeded. It is necessary that you get this message as it confirms that the mobile spy software application has actually made an effective connection with the remote cell phone spy server. It will not be possible to keep track of the phone unless you receive this confirmation. The message will appear on the screen of the mobile phone. That's it! You're done! You have now successfully installed and triggered the spyware. Delete the Downloaded File to Remain Private. Upon completion, the app will usually go back to the Home screen of the mobile phone or mobile phone. At this moment, you might want to remove the android spydownloaded file from the download section of the device. To remove the file, follow these instructions:. From the home screen, tap on the Apps button. Discover the Download icon and tap on it. Find the file you wish to tap and delete on it. From the menu options select Delete. Erasing the downloaded file can help stay confidential and discreet. When the app is erased from the Downloaded Files section, there will no trace of the app on the cellular phone, for the most part. STEP THREE:. Now, the FUN Part ... Viewing Information from the Target Phone. The best part about doing all this is finally getting to see the stuff you wish to see. When the app is effectively set up and operating, info from the target phone such as: text messages, calls, GPS, images, videos, Facebook, Twitter, Instagram, and much more will be right at your fingertips. To access this details, many cell spy apps and text message spy apps need you to login to your online account. Your online spy account from the phone spy business is really comparable to your online banking account. You will go to the login and enter your username and password just as you would for online banking. The only distinction may be that your username and password for your cellular phone tracking account will be appointed by the business you bought the spy program versus a tailored savings account login. In many cases, with cell phone spy and text message Android spy software application, the e-mail address you utilized to buy the program will be your username and your license secret, which is developed by their system, will be your password. You will be able to alter your password after your initial login if you choose. Whether you select to login from your mobile device or computer, the sign-in process will be the same. Initially, find your username and password, which is typically sent out in an email to the address associated with your program purchase. Enter the details in the appropriate field. After this, you will be given your online account where you will have the ability to see all details that has actually been extracted from the phone you are spying. You will not have any issue seeing the info if you acquired one of my suggestions. A normal Dashboard will have a summary or compilation of all data that is offered for viewing. You can see the overall variety of text messages and calls present in your account. Likewise offered are images, videos, GPS place, and diagnostic data from the phone such as; running system and version, battery life, and available memory. When you spy on text messages and mobile phone from another location, similar to anything that includes a big amount of information, it assists a good deal to have whatever cool and organized. An excellent cell phone Android spy app with a great user interface will design everything for you in a really cool, organized method. Text messages are sorted by date or phone number, and all call information will be organized in the same manner. A GPS tracker of good remote cell phone Android spy software application will have prompt updates and will show the place of the phone on a Google Map. The GPS locator will track the area of the device to within 50 feet of its real area and offer the address of the present or last uploaded area, for the most part. From the screenshots above, you can see that the program is very capable and able to track practically every activity and transmission of the target phone. The more details you have available to you, the better your decision-making ability will be. Call listings are an extremely important feature. The call listing screen of most remote mobile phone spy software programs will offer recordings of the calls duration, phone number called, and possibly the name of the caller (if the caller is in the contacts list of the target phone). Additional settings. From your own mobile phone, you will have the ability to send commands to the cellular phone you are monitoring. This provides users with an extra amount of control when monitoring a cell phone. Some commands that you can send:. GPS command (#$ #GPS #$ #)-- Force upload of GPS area, thus getting rid of the need to wait till the programs next arranged upload. Stealth Camera (#$ #camera #$ #)-- Take an image using the target phones camera and have it published to your online account for viewing. Remote Uninstall (#$ #uninstall #$ #)-- Remotely uninstall the program which removes the need of having access to the phone. Lock Target Phone (#$ #PHONELOCK #$ #)-- Locks the target phone in case it is lost or taken. Unlock Target Phone (#$ #PHONEUNLOCK #$ #)-- Unlocks the target phone. Remote Installation Traceability (#$ #TRACEBILITY #$ #)-- Traces current activity of the target phone. From within your online account and control board Dashboard, you can toggle any function of the app "On or Off" without having access to the target phone. Now that you have actually discovered how to spy on a cell phone, you're set! You will have the ability to quickly select a cell phone iPhone or Android spy program, whether a newbies variation or a more capable "Pro Version" such as Auto Forward. After all, you have the knowledge and experience now to run almost any cell spy program. Depending on why you started spying on a cellular phone, you can now move on with your life and make what appeared to be a difficult option possible. If you're having problem with a teen, you might now have the info you require to make decisions that will considerably modify their course and possibly prevent disaster. You can now make changes necessary to get rid of those conditions if you believed worker dishonesty. The info can likewise provide some clarity if you think a loved among wrongdoing. With this, you now have the power to make life-altering choices and set yourself complimentary. I hope this guide has actually assisted you shed some light on situations in your life that appeared helpless and out of control since now, you have control. Take advantage of it. The only thing you can manage in this world is yourself! Top Programs To Spy On A Cell Phone In 2021. From my 8 years in the business, I have actually encountered numerous mobile phone android spy apps, but just a couple of that really work. I will give you my recommendation and you can pick which is best for you. I have actually picked to provide you with the programs that have the very best balance of reliability, expense, and simplicity. The suggested spy programs below also have no month-to-month fees and additional expenses. I HATE month-to-month subscriptions so I didn't wish to provide you something I wouldn't buy myself. Make good sense? While assembling the How-To-Guide, I did a test run on each of these programs. So, you can be rest assured understanding that they are trustworthy and dependable. Here are my recommendations:. # 1: PhoneSpector. My top choice! This software application works as both a tracking and information backup software application. You can keep track of ALL phone activities in addition to making certain the iPhone or Android phone's information is conserved. The backup feature comes in handy specifically if the software application is being used a lost, stolen, or broken gadget. Some products claim to have the ability to spy on cell phone without having access to the phone. And others will tell you that it is possible to spy on a cell phone without setting up software to the phone you desire to spy on. It is important that you get this message as it verifies that the mobile spy software application has made an effective connection with the remote cell phone spy server. Your online spy account from the phone spy business is very similar to your online banking account. You can keep track of ALL phone activities along with making sure the iPhone or Android phone's data is conserved. Just recently, they brought out their updated Version 7 of their software (which I've checked). The brand-new features added consist of keylogger (recording phone keystrokes), getting complete sent out and received social networks messages (Facebook, Instagram, etc.), and increased GPS tracking precision. Together with PhoneSpector standing out with its current (and remarkable) upgrade, they are also remaining present by being compatible with the latest iPhone and Android smart devices and running systems. This includes the most recent iPhone 11 operating on iOS 14 and the Samsung Galaxy 10 series working on Android 9 Pie. Presently, PhoneSpector is having an unique complimentary trial you can attempt! You can read my PhoneSpector evaluation here. # 2: Auto Forward Car Forward is fast on its way to becoming the very best cellular phone spy software application on the internet. Every day, I read reviews about how this company is adding functions and refining the item. So, I chose to provide it another test run. I got in touch with the business that develops Auto Forward and they were nice enough to give me a copy with which to conduct this evaluation. The newest edition of Auto Forward Spy is packed with features that will assist even the most unskilled newbie display and spy on a cell phone. I am not going to state that it is the most innovative. Turns out that the evaluations I have actually read and the short articles on TechCrunch and CNN are true. They really have done an excellent task in improving this software. Their hard work and research study are definitely paying off. Car Forward has actually come from an "also-ran" to a "leader-of-the-pack" in a very short time. My screening exposed an extremely easy to use interface and installation procedure. Car Forward transcended with submitting details from the target phone and reporting it in a really easy-to-read format. What was really cool is that I could spy on a cellular phone without having the access to it and installing software application directly. After the initial setup, I no longer needed to have the target phone. It truly was very easy. Vehicle Forward has included numerous features to be equivalent with the rest of the industry. Car Forward now possesses these functions: Text Message Monitoring-- Monitors and records all SMS text messages and iMessages. It keeps records of all SMS text sent and gotten. Social Network Monitoring-- Facebook, Twitter, Instagram, WhatsApp, Skype, and lots of other social media platforms. http://bestcellphonespyapps.com/ -Time GPS Tracking-- Keeps precise track of the phone place and displays the area of the device on a Google Map. Location collaborates are submitted every 10 minutes. Calls Monitoring-- Record all call information and period, and the phone number. Stealth Camera-- Take a secret picture utilizing the target phones camera. Photos and Videos-- See all photos and videos taken and taped on the target phone. Web Browser History-- See all websites visited by the target phone. From whatever I have seen in the most recent variation of Auto Forward, it has whatever you might possible want in a cell phone spy program. Their customer assistance department was quick to answer any concerns I had and best of all, they have a phone number you can call Monday thru Friday 9am-5pm EST and someone in fact addresses the phone, which is a BIG plus! # 3: Highster Mobile Highster Mobile Best Android Cell Phone Spy App Highster Mobile is a very capable cellular phone monitoring program. It has many advanced features that make spying on mobile phone really easy. There isn't much this program can't do. Under the hood, it has the most advanced shows code, which is to state that it operates extremely fast and extremely effectively. Lots of have actually stated that mobile phone spy software programs actually decrease battery life by as much as 50%. Highster Mobile will not do that. It has been reported to have little or no impact on cellular phone battery life. Some of the sophisticated features of Highster Mobile include: Text Message Monitoring-- See all IMessages and sms messages sent out and gotten. Consists of time, date, and telephone variety of sender or recipient, in addition to the message contents. GPS Tracking-- Reports area on a Google Map in real-time. Social Network Messages-- Retrieves full messages, contents and all, send and received on social media platforms like Facebook, Twitter, and Instagram. 24/7 Customer Support-- By email or phone, they have someone to help you ought to you get stuck or have questions. There are a lot of bad spy apps out there, but Highster Mobile is not one them. This is a program that will not disappoint and is problem-free. Visit their website HERE, and check out my review of it! I hope I have shed some light on how to spy on a cellular phone in 2021. We understand that this is a very complex subject for many people and hope that we have actually helped you fix some troublesome problems in your life. Thanks for visiting and reading my article. Drop by frequently for frequent updates. Auto Forward is quick on its way to ending up being the finest cell phone spy software application on the web. The most current edition of Auto Forward Spy is loaded with features that will help even the most unskilled novice display and spy on a cell phone. What was actually cool is that I might spy on a cell phone without having the access to it and installing software application straight. It has many advanced features that make spying on cell phones really simple. Lots of have actually stated that cell phone spy software programs really reduce battery life by as much as 50%.
vimeo
1 note
·
View note
Text
spy sms forwarding android
If, after reading the above mentioned bullet lists, you're still best to go, let's continue on and find both of these apps ready to go. You may not think you are in need of a fancy app for something as easy as texting. Preparing the app is only going to take a couple of minutes. This app gives you basic functionality, and might be modified in various ways dependent on the phone... Read More but I will recommend Pansi SMS as an excellent fourth. Text spy apps are available for download at this.
The program is getting popular around the world. It is really meant to give the service to make the life more comfort and reliability of the internet users. This program will allow you to understand what your kids are up to. You'll be asked to install the correct software in the cell phones that need to be tracked.
Step one is to install the computer software. The software was generated to generate the low calls whether from the net or via the phone. This spy software employs a very advanced and intelligent software program is effective in its own environment to provide the best mobile phone surveillance available on the market. The spy software for this kind of cell phone employs the web.
Text messages can be transmitted via websites. You can even incorporate a message that will show up on the lock screen. You don't wish to cover each message twice. In case you are getting unwanted text messages via an unknown mobile phone number, you may use the web to find out who the sender is. In case the sole thing you desire is to read wife's text messages online, you can search for a fairly basic package.
For iPhone checkout BiteSMS that's mostly a totally free service. As soon as you find the right support you should first request the cell app providing that specific support. The service provider will make sure you would like to get the details for genuine explanations. Many service providers provide subscription packages on monthly or yearly contracts, and you may also obtain excellent pay-as-you-go deals. You should also find the major VoIP providers in your geographical location. You also don't have to discontinue your initial telephone services.
Some phones even have the facility of mobile phone tracking. While this phone is intended for basic purposes, it's not in any respect flashy phone. If you prefer a really functional basic cell phone at reasonable prices, the Intex IN 1212 GSM is perfect purchase.
spy sms forwarding android
Mobile phones do permit you to stay in contact with your family members, but you might also tell the biggest lies about your present location whilst using these phones. You will like to carry this trendy phone with you always. This Intex mobile phone appears stylish and fashionable. Your calls are now forwarded to the new number. Call logs it is possible to check all your recent calls employing this choice. First of all, you should be sure you get secure video calls.
0 notes
Text
Sms trace download
Microsoft SMS Trace Download - It allows you to trace the actions.
I want to download a SMS trace Microsoft. - T.
VMM Troubleshooting Tools: Trace32 and TextAnalysisTool - TechNet.
How to trace SMPP traffic with Wireshark.
Trace32 aka SMS Trace: App Reviews, Features, Pricing.
CMTrace download link.
SMS Tracking Software | SMS Tracker for iPhone | Android SMS.
10 Free SMS Tracker Without Installing on Target Phone.
Trace Bulk SMS Sender / Who Sends Bulk SMS Service.
SMS Trace for Android - APK Download.
CellTrack - Send Anonymous SMS, Find, and Track a Phone.
Download SQL Server Management Studio (SSMS).
10 Best secret SMS Tracker apps to Spy on Text messages.
Microsoft SMS Trace Download - It allows you to trace the actions.
Dec 26, 2020 · Read on to find out how to trace spoof text messages. How To Trace Spoof Text Messages. All SMS messages are delivered through a short message service center (SMSC). An SMSC is the portion of a wireless network that handles SMS operations like routing, forwarding, and storing incoming text messages. Every SMSC has a unique address or a Global. SQL Server Management Studio (SSMS) is an integrated environment for managing any SQL infrastructure, from SQL Server to Azure SQL Database. SSMS provides tools to configure, monitor, and administer instances of SQL Server and databases. Use SSMS to deploy, monitor, and upgrade the data-tier components used by your applications, and build. How to track others phone call recording, text message, sms and live location. spy & monitor app free download. The only thing you need is this cool monitoring software, you can now go online. Download the app and install it on your target device (in this case your wife's smartphone) and let the app do the rest for you.
I want to download a SMS trace Microsoft. - T.
A software solution for every season. Precision farming is about answering questions that can make you more profitable in all your field activity. SMS Software is an easy-to-use decision-making tool to help you capture the most out of every acre. Free SMS tracker for hidden (spy) tracking of text messages. Snoopza is more than a modern SMS tracker (text spy); it’s a complex solution and powerful Android phone tracker. This free app allows you to monitor all received or sent information, MMS and other image messages, including WhatsApp and Viber. You can even spy on Facebook. Thank you guys, I have downloaded the tools from this microsoft link.
VMM Troubleshooting Tools: Trace32 and TextAnalysisTool - TechNet.
Sep 11, 2020 · Price: Free trial/ $3.99 per month. MMGuardian is another handy sms tracker app for watching conversations on the phone. It sends alerts for text messages, social media chat messages, or web searches. In addition to normal SMS texts, you will see chats form social apps, including Facebook Messenger, WhatsApp, and Instagram.
How to trace SMPP traffic with Wireshark.
Explain SMS Trace Download There are several third-parties tracking software available for digging into log files. Microsoft also offers its log tracker for Microsoft servers. Download Trace SMS and enjoy it on your iPhone, iPad, and iPod touch. Trace SMS lets you perform all goods-related processes in your stores and gives you control over inventory and orders. Provide every employee with a complete overview of goods, orders, tasks and assignments – all in one convenient spot.
Trace32 aka SMS Trace: App Reviews, Features, Pricing.
SpyHuman is one of the leading apps with a spy on text messages feature to help you know and read all the text messages with accurate date and time. SpyHuman allows you to accurately trace your friends, children, spouse and partner with the latest GPS location tracker. All you need to spy, SpyHuman has it all. Trace Short Code. Trace Bulk SMS Sender. Mobile Number Tracker. Check DND Status. Mobile Operator Series Location. Business Opportunities. Bulk SMS Reseller Program. SMS Reseller FAQ. That will install only Trace32 at C:\Program Files (x86)\ConfigMgr 2007 Toolkit V2 (add this to your PATH variable for ease of access). For the 2012 R2 toolkit choose the option to install only the Client Tools and skip the rest. That will install CMTrace and a few other tools at C:\Program Files (x86)\ConfigMgr 2012 Toolkit R2\ClientTools (add.
CMTrace download link.
Mar 29, 2020 · Copy9 is a versatile SMS Tracker solution for parents and employers. You can see all text messages whether sent or received from the target phone. Moreover, you can see the conversations happening on instant messaging apps such as Skype, Viber, Whatsapp, Facebook, Yahoo Messenger, etc. To use SMS Trace to view log files, follow these steps: Start SMS Trace from the Systems Management Server program group. The SMS Tracer window will appear, as shown in Figure 5-48. Choose Open from the File menu or click the File Open icon on the toolbar to display the Open dialog box. SMS Trace will automatically default to the SMS\Logs. The Easy logger is designed to be an easy cell phone monitor and tracker for Android smartphones like Samsung, Sony, Motorola, LG, Huawei, OnePlus, Google, Asus and more. If you need to track your significant other, your child’s location, monitor your teen’s behavior or simply stay informed about calls/texts made on a company phone, the.
SMS Tracking Software | SMS Tracker for iPhone | Android SMS.
Text from computer with TextMagic Messenger. Our SMS software lets you send text from PC or Mac. Download Now now and try for free!.
10 Free SMS Tracker Without Installing on Target Phone.
. Remotely track and monitor all SMS, MMS, text messages, calls, and GPS location. Uninstalling SMS Tracker or System Health from a phone If you need to remove our app from your phone, follow these short instructions. T, an executable found in System Center Configuration Manager 2007, can quickly open very large trace files and will automatically highlight lines with apparent errors. This tool will allow you to quickly open very large files and locate errors visually. Built-in are tools for filtering based on various parameters as indicated in the.
Trace Bulk SMS Sender / Who Sends Bulk SMS Service.
There are more than 25 alternatives to Trace32 aka SMS Trace for Windows, Linux, Mac and Self-Hosted solutions. The best alternative is LogExpert, which is both free and Open Source. Other great apps like Trace32 aka SMS Trace are glogg, BareTail, SnakeTail and klogg. Trace32 aka SMS Trace alternatives are mainly Web Log Analyzers but may also.
SMS Trace for Android - APK Download.
. Features Totally free for an endless number of users. Get GPS notifications, when one of your kids are nearby. Phone tracker app uses both cell tracking and GPS tracking to optimize battery usage and accuracy of the location. Find your lost or stolen phone easily using a family member's registered phone.
CellTrack - Send Anonymous SMS, Find, and Track a Phone.
1.1.1. File Name: I Date Published: 5/12/2016. File Size: 3.2 MB. Short Message Service (SMS)-capable phones are the most common digital-access devices in the world, with more than 2.5 billion devices sold to date. Unfortunately, much of the great data and functionality based in PC networks has been unavailable to SMS-based phones. One Time Password Verification SMS. Promotional SMS. Community SMS / Optin SMS. Long Code SMS. Voice Calls. Missed Call Notification. Free SMS Campaign Database. Quiz SMS. 2 Factor Authentication via Missed Call. Trace any number in 5 seconds. Enter the phone number you wish to lookup below. CellTrack will not only trace the location of that phone, but look up the name, address and picture as well.... My friends and I had a good laugh with CellTrack, we pranked the concierge several times with a Spoof-SMS. Had a Real good laugh with this service.
Download SQL Server Management Studio (SSMS).
Download SMS Software for Free. With our SMS Excel Plug-in and desktop sms you can send single sms, multiple sms, group sms, scheduled sms, generate mobile numbers... Bulk SMS Cities; Trace; SMS Reseller. Bulk SMS Reseller Program; SMS Reseller FAQ; Blog; Download Free Bulk SMS Software. Home; Download Software / Add-on. Download SMS Tracker for free. GPS/SMS-Tracker for Microsoft Windows CE. Developed in C#.
10 Best secret SMS Tracker apps to Spy on Text messages.
Best Free SMS Tracker Without Installing on Target Phone - mSpy. If you're wondering how to get text message records, mSpy is your answer. mSpy SMS phone tracker app is impressive because it offers a wide variety of parental control features, including: Note: We have a special 15% mSpy discount code for our readers. This tool is also called as CMTrace tool that is useful to read SCCM logs. As the name says, "log tool" this CMTrace log viewer tool opens the SCCM log files. Unlike other log viewers this tool shows the data as the log file is written or updated. The CMTrace log viewer shows the most recent updated lines written to the log file.
Other content:
Amazon Prime Kodi Addon Download
Delphi Cars Software Download
Metal Gear V The Phantom Pain Pc Download Torrent
0 notes
Text
The dangers of spam SMS
Ahmed Mansour knew immediately that something was wrong with the unsolicited text messages on his iPhone. It was August 2016, the hottest time of the year in the United Arab Emirates (UAE), and as a renowned advocate for human rights, Mansour was already familiar with government surveillance techniques. According to The Guardian newspaper, his activities inside and outside the country had already been monitored for some time.
But the two anonymous text messages were something new. They contained links to information that would help him in his human rights activities. Mansour was suspicious by nature of his work and forwarded the messages to cybersecurity analysts for investigation.
The danger of spam Most computer users receive a fair amount of unsolicited email offering anything from access to African bank accounts to the latest inside information on something of great interest to the reader. Often the spam emails contain links to websites (often malicious websites) or attached files to download. They usually claim to improve the recipient's financial situation or professional life. However, the attached files or the links result in malware being introduced to the computer.
Many of these emails are "phishing," designed to trick innocent people into taking the bait. Spear phishing are attacks on people using real personal information. Cybercriminals provide the bait in these emails with details that are of interest to the targeted person.
Spam SMS Meanwhile, cybercriminals have expanded their phishing networks to include SMS messages. Partly due to security breaches of customer files containing contact information for millions of users around the world, hackers have been able to successfully write software that sends "bait SMS messages."
When consumers click on the links in the spam SMS messages, they download malware to their devices or are redirected to malicious websites. In some cases, users responded to the SMS, so the sender knew the mobile number was in use and vulnerable. Cybercriminals then use phone calls after the original SMS to defraud cell phone owners.
Getting to the root of the hacking In the case of Mansour, a human rights activist, cybersecurity analysts determined that when he clicked on the links in the SMS messages, he would have relinquished control of his iPhone to the hackers. According to The Guardian newspaper, the privately assembled and sophisticated software "would have allowed attackers to spy on virtually all of Mansour's activities - phone calls, text messages, Gmail, Skype and Facebook - as well as scan his calendar and steal passwords and other personal information."
Dealing with spam SMS Some spam SMS messages are very sophisticated and appear to come from banks, phone providers or other reputable companies. If SMS messages look official, call the authentic customer service number for the company to verify the real-time of the SMS. Do not call the phone number listed in the SMS. It's also a good idea to block the phone number from future SMs so they can't be answered.
Forward spam text messages to the Federal Communications Commission (FCC) and the Federal Trade Commission (FTC). These agencies investigate communications that could be considered illegal, and the state government wants to know about any unwanted text messages you receive. Also, report the text messages to your phone provider as spam.
Apps like Mr Number, SMS Blocker, and Text Blocker offer protection from unwanted SMS messages, as does a high-quality security solution like Total Solution from Kaspersky. This software protects the core of Android and iOS mobile devices, so hackers can't take control of tablets and phones. In most cases, this can detect and remove malware that tries to infiltrate devices via spam message links.
Spam SMS messages phishing for gullible victims are still relatively new, but they are bound to become more and more common. With the right knowledge and protection, you will be well prepared.
0 notes
Text
Top 5 Cell Phone Spy Apps You Need to Know

There’s little doubt that spy programs are legit today. We Can’t deny that we do not need you to save our telephones and personal information. Still, it’s essential to understand whether these spy apps are excellent and perform the job correctly or are not anything more than a scam.
It doesn’t matter if you want to get a free one or more compensated one. An individual should be aware they’re using a trusted program that suits their function in the simplest way possible.
Best Cell Phone Spy Apps for Mobile Spying
If You’re looking forward to something like that, then you’ve landed on the ideal location. We accumulated some crucial details for the sake of your advantage, so you’d have the ability to opt for the very best spy program in the event you’ve decided to attempt one.
Do not waste your time seeking the ideal spy app because everything you want to know is right here.
The following are some of the best five cell phone spy apps you ought to be aware of before considering choosing one.
TheWiSpy
Among the very best ones in our listing is TheWiSpy android spy app. You’d likely have heard it at least once from somebody till today. Have you any idea why? This spy program is just one of the very best ones in the market.
It’s dependable and does all of the jobs professionally. If somebody speaks about some precautionary dimensions from the World of hacking, then the title of TheWiSpy will always stay there.
Aside from its incredible functionality, it’s several Other fantastic Attributes like spying targeted contact amount and supply a thorough report of this background, contact numbers, text messages, track places, and everything that’s been shared and obtained through that amount.
You will find infinite men and women that use this appand are happy with its functionality. This phone spy app works perfectly fine with all iPhones in addition to Android mobiles.
Among the most incredible things, I enjoy about TheWiSpy Is It offers you the listing of this spied amount and informs at all was being typed on the apparatus with the support of its inconceivable keylogger, such as societal networking accounts. There’s not any requirement to jailbreak the device or root it.
You do not need to acquire access to the telephone physically or put in anything on it. It functions in stealth mode. You also do not have any anxiety to be vulnerable since we’ve mentioned before this program does all of the jobs by itself, and there’s no requirement to do anything. This observation application is just one of the best choices one could have.
Spyic
This is just another fantastic choice once we discuss best cell phone spy apps for the two iOS and Android apps. There’s not any requirement to jailbreak or root on the targeted device.
You’d probably think that since it does not require you to Jailbreak or root the apparatus, then there’s this risk that the remaining attributes would suck, but that is indeed not correct.
Spyic has many other terrific attributes than several other spying software that can be found in the industry. Aside from these characteristics that speak for this program, it sends you the targeted cellphone’s dwell location.
It provides you a detailed record of the requirements, which are This is connected with telephone details, including caller identification, call length, and timestamps.
There’s this in-built system at the dash of the app, in which you can assess all of the social networking profiles of the targeted device individually.
MobiStealth
MobiStealth is just another top portable phone spy app of this year that Comes along with a broad assortment of critical characteristics when it comes to spying. It’s available on the market in several unique packages that start from the main version to innovative observing attributes.
These attributes include viewing text messages, monitoring place,
Additionally, it offers portable and PC tracking, making it a seamless preference for transaction owners all around the World. This spy program’s PC monitoring program also helps you protect your gains by uninterruptedly tracking all of the online tasks.
iSpyoo
iSpyro is your mobile spy app meant to check your children’s security from the dangers of the internet world in your employees and Guard your children’s protection. We do not know to whom our children talk and what will be the employees doing in-office hours. If, by any chance, you’re experiencing this similar dilemma, then attempt iSpyoo.
Among the best features of the remarkable top-rated mobile phone Monitoring program is that it lets you track movie calls on Viber and Skype. Additionally, it assists users in monitoring place, SMS, photographs, looking at telephone logs, record calls, and view contacts list, IM chats, emails, and surfing history of their spied device.
You can try out it is a free trial version and enjoy exclusive perks move. It supports android in addition to iPhone impeccably. By making one account, it is easy to track three corresponding devices. Does it not seem unique for you?
MobileSpyAgent
Here is the final one in our listing. It’s a straightforward and Trusted mobile spy program that has excellent tracking attributes. If you’re right in the office and seeking something economical and best, then this is the best tool you go for.
It permits You to access monitor the place, text messages, and view Call history, pictures. Videos capture access targeted telephone information such as memory usage, IMEI, browser history, and also view installed programs, calendars, notes, and a good deal more which you cannot imagine otherwise. You can track cell phone imei number by using TheWiSpy.
Conclusion
By reading this guide, we hope that today you’d have the ability to make some sense of all of this spy software and their attributes that are in demand for quite a while. If you want to select one, this bit of advice will help you make the right option.
Originally Published By: https://webhostingoffer.org/best-5-cell-phone-spy-apps-you-need-to-know/
Republish by: Wix, Blogger, Livejournal
1 note
·
View note
Link
Lost your Android phone? Searching for ways to find it? Want to Find where your Phone is? This post will help you.
Don't panic and just relax
Recall where you saw your phone lastly
Try giving a call to your phone from someone's mobile nearby. (Don't hesitate to ask for help).
If your mobile s switched off and you know where you left your phone (Hotel, Restaurant, Theatre), just try calling that place by getting someone's phone and google the place to find the phone number.
If any of these didn't work please follow the steps below.
A quick way to find your Android Phone:
Login to Google.com with the same Google account your mobile has.
go to google.com/android/find or Type and enter "Find my phone" in Google search.
If you see your mobile phone like the image below, Navigate to that location and click on Ring option. This will make your phone ring so that you can find the phone with the sound.
We carry a small world in our pockets these days, and it is called our "cellphone". It has our special memories, our personal and professional emails, our social media access, e-wallets, and all our streamings. We all are not just dependent on our phones for our day-to-day operations but also emotionally attached to it. Our whole world resides in our phones and we just can't afford this world to end. The simple thought of losing the phone is scary, isn't it? So what to do in such a case of emergency? Going to the police station and filing FIR is a tough task. We need to wait for the approval of the police which takes time.

How to Track a Lost Android Phone in 2020
While there are different techniques to track an Android phone, there are several free-of-cost DIY ways to find a lost android phone in 2020. In this article, we will specifically cover some easy ways to find a lost android phone.
1. Find Your Phone Using Google Search
The simplest way of finding your device is by searching "find my device” into. Keep in mind that your phone needs to be connected with the google account and you have to log in to Google and go to google.com/android/find or search "Find my phone", after that, Google will show you the location of your device.
Borrow a Mobile from someone nearby
Open the browser (For safety concern open the browser in incognito mode)
and Google search "Find my phone" or "Find my device"
You'll see a screen like below

Login to your Google account now
You'll see your device location if the Internet and GPS are ON.
If you manage to see the location of your device, you have 3 options to do. Play sound - You can click on Ring icon to make your Android phone sound for 5 minutes in high volume, even in silent mode. Secure mode - Clicking secure device will lock your device and sign out of your Google account. Once it is locked nobody can access your phone. Erase Device - This should be your final option, clicking on the Erase device will totally erase all the data in your phone, all your contacts, photos, Apps, totally everything.

You can also use Find my device Android App. This location will be accurate unless the stealer turns off your mobile GPS or gives a fake GPS location by accessing your phone.
But it has some limitations. It works only when you are logged into your Google account and have access to the Internet.
How to Find your Phone when No Internet and GPS is ON?
The above method will only work if you have an internet and GPS connection and in some cases based on the tower location you'll get the device location, but what if you don't have access to your phone and your phone is switched off or getting no response? follow these steps below.
1. Find Mobile using Google TimeLine
If you are too late to know about Google searching "Find my device", then you can make use of the Timeline feature in Google maps. If your phone got stolen and the guy who snatched your phone traveled to places with the Internet and GPS ON this will show all the places your phone traveled, with these clues you have some percentage chance of finding your phone.

Sign-in to Google Maps, using the Google account used in your mobile.
Click on the menu at the top left corner and click on "Your Timeline".
Now click on the day when your android got stolen, and you'll be able to see the location history of your lost phone if it had internet connectivity and GPS ON. You'll manage to see your location if the phone is connected with the internet at the moment. It is impossible to find your device if it has no internet connection.
2. File the Police compliant with IMEI number
If the above step didn't work, go to the nearby police station and file a complaint with your Android mobiles IMEI number and your mobile phone number. Police will forward this case to Cybercrime and they will track your mobile phone using the IMEI number and with Sim card last shown tower location, also when your phone gets turned ON again, even though you haven't turned Internet and GPS ON, based on the tower location police can find your phone quickly.
How to Find IMEI number? - Check the mobile phone box that you got while buying. - If you bought the phone through amazon or Flipkart, check the invoice.
3. Apps to Find Your Android device
Another quick and no-cost way of finding your device location is to send a code via message which will make the phone ring even when it is in a silent mode and it will also send you the GPS coordinates of the device. You can use some Android apps to do this work.
Note: Finding your Phone will only work if you have any of the below-mentioned app installed on your phone. Some of the top apps to find your device are listed below:
Life360 - Family Locator, GPS Tracker

This is the best mobile phone locator app, the best feature is, you can add your family member's mobile phones here and you can track the location. Easily identify the location of the stolen or lost phone. You can also create alerts when a member leaves the destination you added.
Find My Phone

This App will give you the accurate location of your mobile phone, you can also use this app on tablets, even on iPhone and iPad.
Wheres My Droid

Wheres My Droid is another app to find a phone, but with many different features, you can find the phone and make it ring or vibrate, Lock your phone remotely, wipe data from the SD card in your mobile, SIM change notifications, and many more.
Lost Android

This is one of the oldest applications with the latest updates. Along with features like finding the phone, make an alarm sound, erase data, this app has some unique functions like reading sent and received messages on your lost phone, send SMS from the web, take a picture from the front camera and send to your mail-id.
Prey Anti Theft: Find My Phone

This company Prey Anti Theft has 10 years of experience in locating phones. Along with the above-mentioned features, this app also has location history, Control zone actions, Security message alert - you can display a message on your mobile phone with a flashing screen.
Even the Android Antivirus Apps have features to track a lost phone.
Other helpful links to find your phone:
https://www.digitaltrends.com/mobile/how-to-track-an-android-phone/
https://www.wikihow.tech/Find-a-Stolen-Android-Phone
https://www.androidcentral.com/how-track-android-phone
Found your lost Android Phone?
If you have successfully found your phone with any of the above methods, please show that in comments, also if you tried any other method show that too in comments, I'll try to update that in the post, that will be helpful to the others. Also, try my previous post on Hidden Spy Camera Detector Apps.
The post 4 ways to Find a Lost Android Phone [Updated for 2020] appeared first on Waftr.com.
0 notes
Text
Most Noticeable Spy on Text Messages Free
Spy on text messages free - It does this by combing the memory of the smart phone as well as removing all offered old as well as deleted text messages that haven't been overwritten. It grants me accessibility to e-mails, text, calls, and also several various other things. It has helped literally thousands of countless people to spy on cellular phone and particularly, collect sms message from almost any kind of smart phone on the market.
Free download link:http://copy9.com/spy-on-text-messages/
It is my top option for snooping on iMessages as well as sms message of any kind of Apple gadget and Android device. It is not uncommon for individuals to report the extraction of sms message from up to one-year-old. It will certainly draw out iMessages and also text messages from all apples iphone and also iPads.
Its attributes are unlimited whereas those of the previous technique are restricted to exclusively text messages, that as well just one of the most recent ones. Simply install the software program on your youngster's cellphone, as well as you could SECRETLY discover the truth about their telephone call logs, text messages, as well as GPS areas by logging into your signed up account from any kind of internet internet browser. Maintains a running record of all sms message sent and also gotten, as well as is readable from within your control panel.
Like various other spy phone applications listed below Easy Spy allows you to spy on text messages, call, web surfing history, emails, social media ... essentially anything the customer does on the target device. Like various other spy phone applications noted here, it has all the fundamental functions, including the capacity to spy on sms message, track GENERAL PRACTITIONER area, and monitor instant messages. Like various other spy telephone applications listed here, it has all the standard attributes, like the ability display split second messages, track GPS place, as well as to spy on text.
Log right into your personal Control Panel to watch detailed data on all the individual's activities on a track your target tool: telephone calls recorder, text messages, gps locations, track whatsapp, viber, facebook,. & web tasks. Make certain to take a look at our extensive, not Android-only, the best ways to track a cellular phone write-up ... Genuine smart phone tracker This is just one of the snooping on actual mobile phone tracker sms message. Many of the available cellular phone surveillance systems that track sms message share comparable features, but some vary.
Most individuals wish to see text messages from the phone they have an interest in tracking. Much like Copy9 and also Vehicle Ahead, 9SpyApps enables individuals to spy on text and also see immediate carrier chat discussions. Copy9 application furtively and constantly keeps track of text, GENERAL PRACTITIONER location, Phone calls, Photos, Websites Visited, Videos, and also it checks social networks networks such as Twitter, Facebook as well as etc, that occurs on a cell phone.
No question, you can after that utilize this system at your personal online, protected account, to spy on text messages. Not ready for the big time yet) Similar to Copy9 as well as Car Forward, Copy9 enables customers to snoop on sms message and see instant carrier chat conversations. When a partner purchases this spy application from the wide selection of selections there is in the market, they would certainly be able to check not simply the sharing as well as trading of sms message (SMS), however likewise call background, history of GPS places and social networks activities of their companions in real time.
1 note
·
View note
Text
How can i check my husband mobile without his knowing
Women in a relationship mostly become possessive about their husband. So, they always keen to keep an eye on their spouse and want to know what they do, where they go, whom they have met and plenty of other things alike. Over the years, the mobile phones technology is been on the rise and it gives shelter to the spouses to make phone calls, use social media apps, text messages, audio video conversations without their partner knowing. Therefore, online infidelity is a serious issue that has been penetrated among the couples due to some odd reasons. So, spouses, these days are looking forward to checking their husband’s phone without them knowing.However, if you are one of those wives who want to track their partner’s cell phone secretly then you must-have TheOneSpy cell phone spy app that works secretly on the target person device and get the job done for you. Let’s have look in the following how you can get your aim within no time by staying hidden.Use cell phone spy app to check husband phone without him knowingIf you want to get your hands on the high –tech tool to put your husband mobile phone device under constant surveillance then you should go for the mobile phone tracking app. So, you have to visit the official web page of the spy software for the phone. Once you are the page using your personal cell phone or PC browser connected to the internet you need to perform following mentioned tools to get the job done secretly.Subscribe for Android phone spy softwareNow get subscription of Android Spyware online once you are on the web page and further you will get an email at your given ID. It will provide you password and ID that you need to memorize in your mind or keep it on your email.Get Physical access on husband’s cell phoneFurthermore, the user just needs to get physical access on the target device and once you have got it then start the process of installation. After the completion of the installation process simply activate phone surveillance on the target device.Hide the cell phone monitoring app on your husband deviceNow you will see a pop –up message on the screen when you are about to end up with the activation process. Use the message instructions and you will be able to hide the Android spy app on the target device. Now it will work under complete secrecy. In addition, you can complete the process of activation on the target device.Use Credentials to use web control panelIt is time to use the password and ID that you have been procured at the time of subscription. Now get access to the electronic web portal where you can visit plenty of powerful spouse monitoring tools. Let’s use these tools using an online control panel to check your husband’s phone without him knowing.Use tracking app tools to check husband’s phone without him knowingLive Screen recordingThe spouse can remotely perform live screen recording on the husband’s phone to make short back to back videos of the screen. In addition, user can you can visit the live recorded videos of the screen through the web portal. Spouses can perform real-time screen recording of chrome, social media, SMS, emails, and applied passwords on the phone.Call recordingYou can record and listen to the live incoming and outgoing phone calls on your husband cell phone and he will remain clueless. All you need to do is to use a secret call recorder on the target device.Surround MonitoringWives even can monitor surrounds of their husband’s cell phone especially if they used to come late at nights. You can remotely control the target cell phone device MIC using MIC bug app. So, you can record and listen to the surrounds voices and conversation.IM‘s without rootingYou can remotely get access to the logs of the social media apps without rooting if your husband is using an android mobile phone. You can view the logs of text messages, text conversations, audio video conversations, shared photos, videos and voice calls.Conclusion:End user can use mobile phone surveillance app and remotely check husband cell phone without knowing.
SOURCE URL
0 notes
Text
Original Post from Security Affairs Author: Pierluigi Paganini
Researchers are warning of a new variant of recently disclosed SimJacker attack, dubbed WIBattack, that could expose millions of mobile phones to remote hacking.
WIBattack is a new variant of the recently discovered Simjacker attack method that could expose millions of mobile phones to remote hacking.
A couple of weeks ago, cybersecurity researchers at AdaptiveMobile Security disclosed a critical vulnerability in SIM cards dubbed SimJacker that could be exploited by remote attackers to compromise targeted mobile phones and spy on victims just by sending an SMS.
The SimJacker vulnerability resides in the S@T (SIMalliance Toolbox) Browser dynamic SIM toolkit that is embedded in most SIM cards used by mobile operators in at least 30 countries. The experts discovered that that the exploitation of the vulnerability is independent of the model of phone used by the victim.
The scary part of the story is that a private surveillance firm was aware of the zero-day flaw since at least two years and is actively exploiting the SimJacker vulnerability to spy on mobile users in several countries.
Following the disclosure of the Simjacker attack, the researcher Lakatos from Ginno Security Lab discovered that another dynamic SIM toolkit, called Wireless Internet Browser (WIB), can be exploited in a similar way.
Lakatos first discovered this vulnerability back in 2015, but he did not publicly disclose the flaw is hard to patch and it could be abused by threat actors to remotely take over the phones running vulnerable SIMs.
“We researched security in simcard and discovered the vulnerability in WIB simcard-browser that causes serious harm to hundreds of millions of telecom subscribers worldwide in 2015, and the vulnerability has not ever been published yet.” reads a blog post published by the researcher.
“We researched security in simcard and discovered the vulnerability in WIB simcard-browser that causes serious harm to hundreds of millions of telecom subscribers worldwide in 2015, and the vulnerability has not ever been published yet.
By sending a malicious SMS to victim phone number, attacker can abuse the vulnerabilities in the WIB sim browser to remotely take control of the victim mobile phone to perform harmful actions such as: send sms, make phone call, get victim’s location, launch other browsers (e.g WAP browser), get victim’s IMEI, etc.”
The researcher also claimed to have discovered the flaw in S@T Browser and disclosed a video PoC of the Simjacker with details that have not yet been published by AdaptiveMobile Security researchers.
The flaw in both S@T and WIB Browsers can be exploited to perform several malicious tasks by sending an SMS containing a spyware-like code.
Back to the WIBattack, the WIB toolkit was created by SmartTrust, a company that provides SIM toolkit-based browsing solutions hundreds of mobile operators worldwide, including AT&T, Etisalat, KPN, TMobile, Telenor, and Vodafone.
Like the S@T Browser, WIB toolkit has also been designed to allow mobile carriers to provide some essential services, subscriptions, and value-added services over-the-air to the customers. It also allows changing core network settings on their devices.
“OTA is based on client/server architecture where at one end there is an operator back-end system (customer care, billing system, application server…) and at the other end there is a SIM card,” continues the researcher.
The flaw in the WIB toolkit could be exploited to:
Retrieve the target device’ location and IMEI
Send fake messages on behalf of victims,
Distribute malware by launching victim’s phone browser and visiting a malicious web page
dial premium-rate numbers
Call the attacker’s phone number to spy on victims’ surroundings via the device’s microphone
Perform denial of service attacks by disabling the SIM card
Retrieving target device info (i.e language, radio type, battery level, etc.)
Below the attack scenario described by the expert:
(1) Attacker sends a malicious OTA SMS to the victim phone number. The OTA SMS contains WIB command such as: SETUP CALL, SEND SMS, PROVIDE LOCATION INFO, etc.
(2) Right after receiving the OTA SMS, Baseband Operating System of the victim mobile phone uses ENVELOP COMMAND ( an APDU command to communicate between mobile phone and simcard) to forward the TPDU of the OTA SMS to WIB browser in victim’s simcard. Different from the procedure of receiving the normal text sms, the procedure OTA SMS is silently handled just in baseband operating system and does not raise any alert to application operating system (android os, ios, blackberry os, …). Neither feature phone nor smart phone raises alert about the procedure of ota sms: no ringing, no vibration, no detection from users.
(3) WIB browser follows the WIB commands inside the TPDU of OTA SMS and sends the corresponding PROACTIVE COMMAND to the victim mobile phone such as: SETUP CALL, SEND SMS, PROVIDE LOCATION INFO.
(4) The victim mobile phone follows the PROACTIVE COMMAND received from victim’s simcard to perform the corresponding actions such as: make a phone call, send an sms to whatever phone number attacker wants (e.g receiver mobile phone in the figure).
The researcher published a video PoC of the attack:
Lakatos shared his findings on WIBAttack with the GSM Association (GSMA). Summarizing, at least two hacking techniques leverage vulnerabilities in one of the components of most of the mobile SIM cards of the market potentially exposing billions of mobile users at attacks.
The researcher announced that is working on a mobile phone app that would allow users to scan their SIM cards to determine if they are vulnerable to the Simjacker attack.
The researchers at SRLabs also developed an Android app, named SnoopSnitch, that can detect Simjacker-like attacks. The SnoopSnitch app only runs on rooted Android mobile phones with a Qualcomm chipset.
“The SnoopSnitch Android app warns users about binary SMS attacks including Simjacker since 2014. (Attack alerting requires a rooted Android phone with Qualcomm chipset.)” reported SRLLabs.
window._mNHandle = window._mNHandle || {}; window._mNHandle.queue = window._mNHandle.queue || []; medianet_versionId = "3121199";
try { window._mNHandle.queue.push(function () { window._mNDetails.loadTag("762221962", "300x250", "762221962"); }); } catch (error) {}
Pierluigi Paganini
(SecurityAffairs – WIBattack, hacking)
The post After SIMJacker, WIBattack hacking technique disclosed. Billions of users at risk appeared first on Security Affairs.
#gallery-0-6 { margin: auto; } #gallery-0-6 .gallery-item { float: left; margin-top: 10px; text-align: center; width: 33%; } #gallery-0-6 img { border: 2px solid #cfcfcf; } #gallery-0-6 .gallery-caption { margin-left: 0; } /* see gallery_shortcode() in wp-includes/media.php */
Go to Source Author: Pierluigi Paganini After SIMJacker, WIBattack hacking technique disclosed. Billions of users at risk Original Post from Security Affairs Author: Pierluigi Paganini Researchers are warning of a new variant of recently disclosed SimJacker attack, dubbed…
0 notes
Text
Zuckerberg wants messages to auto-expire to make Facebook a ‘living room’
New Post has been published on http://www.readersforum.tk/zuckerberg-wants-messages-to-auto-expire-to-make-facebook-a-living-room/
Zuckerberg wants messages to auto-expire to make Facebook a ‘living room’
On feed-based “broader social networks, where people can accumulate friends or followers until the services feel more public . . . it feels more like a town square than a more intimate space like a living room” Facebook CEO Mark Zuckerberg explained in a blog post today. With messaging, groups, and ephemeral stories as the fastest growing social features, Zuckerberg laid out why he’s rethinking Facebook as a private living room where people can be comfortable being themselves without fear of hackers, government spying, and embarrassment from old content — all without encryption allowing bad actors to hide their crimes.
Perhaps this will just be more lip service in a time of PR crisis for Facebook. But with the business imperative fueled by social networking’s shift away from permanent feed broadcasting, Facebook can espouse the philosophy of privacy while in reality servicing its shareholders and bottom line. It’s this alignment that actually spurs product change. We saw Facebook’s agility with last year’s realization that a misinformation- and hate-plagued platform wouldn’t survive long-term so it had to triple its security and moderation staff. And in 2017, recognizing the threat of Stories, it implemented them across its apps. Now Facebook might finally see the dollar signs within privacy.
The New York Times’ Mike Isaac recently reported that Facebook planned to unify its Facebook, WhatsApp, and Instagram messaging infrastructure to allow cross-app messaging and end-to-end encryption. And Zuckerberg discussed this and the value of ephemerality on the recent earnings call. But now Zuckerberg has roadmapped a clearer slate of changes and policies to turn Facebook into a living room:
-Facebook will let users opt in to the ability to send or receive messages across Facebook, WhatsApp, and Instagram
-Facebook wants to expand that interoperability to SMS on Android
-Zuckerberg wants to make ephemerality automatic on messaging threads, so chats disappear by default after a month or year, with users able to control that or put timers on individual messages.
-Facebook plans to limit how long it retains metadata on messages once it’s no longer needed for spam or safety protections
-Facebook will extend end-to-end encryption across its messaging apps but use metadata and other non-content signals to weed out criminals using privacy to hide their misdeeds.
-Facebook won’t store data in countries with a bad track record of privacy abuse such as Russia, even if that means having to shut down or postpone operations in a country
You can read the full blog post from Zuckerberg below:
Posted by Mark Zuckerberg on Wednesday, March 6, 2019
A Privacy-Focused Vision for Social Networking
My focus for the last couple of years has been understanding and addressing the biggest challenges facing Facebook. This means taking positions on important issues concerning the future of the internet. In this note, I’ll outline our vision and principles around building a privacy-focused messaging and social networking platform. There’s a lot to do here, and we’re committed to working openly and consulting with experts across society as we develop this.
—
Over the last 15 years, Facebook and Instagram have helped people connect with friends, communities, and interests in the digital equivalent of a town square. But people increasingly also want to connect privately in the digital equivalent of the living room. As I think about the future of the internet, I believe a privacy-focused communications platform will become even more important than today’s open platforms. Privacy gives people the freedom to be themselves and connect more naturally, which is why we build social networks.
Today we already see that private messaging, ephemeral stories, and small groups are by far the fastest growing areas of online communication. There are a number of reasons for this. Many people prefer the intimacy of communicating one-on-one or with just a few friends. People are more cautious of having a permanent record of what they’ve shared. And we all expect to be able to do things like payments privately and securely.
Public social networks will continue to be very important in people’s lives — for connecting with everyone you know, discovering new people, ideas and content, and giving people a voice more broadly. People find these valuable every day, and there are still a lot of useful services to build on top of them. But now, with all the ways people also want to interact privately, there’s also an opportunity to build a simpler platform that’s focused on privacy first.
I understand that many people don’t think Facebook can or would even want to build this kind of privacy-focused platform — because frankly we don’t currently have a strong reputation for building privacy protective services, and we’ve historically focused on tools for more open sharing. But we’ve repeatedly shown that we can evolve to build the services that people really want, including in private messaging and stories.
I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won’t stick around forever. This is the future I hope we will help bring about.
We plan to build this the way we’ve developed WhatsApp: focus on the most fundamental and private use case — messaging — make it as secure as possible, and then build more ways for people to interact on top of that, including calls, video chats, groups, stories, businesses, payments, commerce, and ultimately a platform for many other kinds of private services.
This privacy-focused platform will be built around several principles:
Private interactions. People should have simple, intimate places where they have clear control over who can communicate with them and confidence that no one else can access what they share.
Encryption. People’s private communications should be secure. End-to-end encryption prevents anyone — including us — from seeing what people share on our services.
Permanence. People should be comfortable being themselves, and should not have to worry about what they share coming back to hurt them later. So we won’t keep messages or stories around for longer than necessary to deliver the service or longer than people want it.
Safety. People should expect that we will do everything we can to keep them safe on our services within the limits of what’s possible in an encrypted service.
Interoperability. People should be able to use any of our apps to reach their friends, and they should be able to communicate across networks easily and securely.
Secure data storage. People should expect that we won’t store sensitive data in countries with weak records on human rights like privacy and freedom of expression in order to protect data from being improperly accessed.
Over the next few years, we plan to rebuild more of our services around these ideas. The decisions we’ll face along the way will mean taking positions on important issues concerning the future of the internet. We understand there are a lot of tradeoffs to get right, and we’re committed to consulting with experts and discussing the best way forward. This will take some time, but we’re not going to develop this major change in our direction behind closed doors. We’re going to do this as openly and collaboratively as we can because many of these issues affect different parts of society.
Private Interactions as a Foundation
For a service to feel private, there must never be any doubt about who you are communicating with. We’ve worked hard to build privacy into all our products, including those for public sharing. But one great property of messaging services is that even as your contacts list grows, your individual threads and groups remain private. As your friends evolve over time, messaging services evolve gracefully and remain intimate.
This is different from broader social networks, where people can accumulate friends or followers until the services feel more public. This is well-suited to many important uses — telling all your friends about something, using your voice on important topics, finding communities of people with similar interests, following creators and media, buying and selling things, organizing fundraisers, growing businesses, or many other things that benefit from having everyone you know in one place. Still, when you see all these experiences together, it feels more like a town square than a more intimate space like a living room.
There is an opportunity to build a platform that focuses on all of the ways people want to interact privately. This sense of privacy and intimacy is not just about technical features — it is designed deeply into the feel of the service overall. In WhatsApp, for example, our team is obsessed with creating an intimate environment in every aspect of the product. Even where we’ve built features that allow for broader sharing, it’s still a less public experience. When the team built groups, they put in a size limit to make sure every interaction felt private. When we shipped stories on WhatsApp, we limited public content because we worried it might erode the feeling of privacy to see lots of public content — even if it didn’t actually change who you’re sharing with.
In a few years, I expect future versions of Messenger and WhatsApp to become the main ways people communicate on the Facebook network. We’re focused on making both of these apps faster, simpler, more private and more secure, including with end-to-end encryption. We then plan to add more ways to interact privately with your friends, groups, and businesses. If this evolution is successful, interacting with your friends and family across the Facebook network will become a fundamentally more private experience.
Encryption and Safety
People expect their private communications to be secure and to only be seen by the people they’ve sent them to — not hackers, criminals, over-reaching governments, or even the people operating the services they’re using.
There is a growing awareness that the more entities that have access to your data, the more vulnerabilities there are for someone to misuse it or for a cyber attack to expose it. There is also a growing concern among some that technology may be centralizing power in the hands of governments and companies like ours. And some people worry that our services could access their messages and use them for advertising or in other ways they don’t expect.
End-to-end encryption is an important tool in developing a privacy-focused social network. Encryption is decentralizing — it limits services like ours from seeing the content flowing through them and makes it much harder for anyone else to access your information. This is why encryption is an increasingly important part of our online lives, from banking to healthcare services. It’s also why we built end-to-end encryption into WhatsApp after we acquired it.
In the last year, I’ve spoken with dissidents who’ve told me encryption is the reason they are free, or even alive. Governments often make unlawful demands for data, and while we push back and fight these requests in court, there’s always a risk we’ll lose a case — and if the information isn’t encrypted we’d either have to turn over the data or risk our employees being arrested if we failed to comply. This may seem extreme, but we’ve had a case where one of our employees was actually jailed for not providing access to someone’s private information even though we couldn’t access it since it was encrypted.
At the same time, there are real safety concerns to address before we can implement end-to-end encryption across all of our messaging services. Encryption is a powerful tool for privacy, but that includes the privacy of people doing bad things. When billions of people use a service to connect, some of them are going to misuse it for truly terrible things like child exploitation, terrorism, and extortion. We have a responsibility to work with law enforcement and to help prevent these wherever we can. We are working to improve our ability to identify and stop bad actors across our apps by detecting patterns of activity or through other means, even when we can’t see the content of the messages, and we will continue to invest in this work. But we face an inherent tradeoff because we will never find all of the potential harm we do today when our security systems can see the messages themselves.
Finding the right ways to protect both privacy and safety is something societies have historically grappled with. There are still many open questions here and we’ll consult with safety experts, law enforcement and governments on the best ways to implement safety measures. We’ll also need to work together with other platforms to make sure that as an industry we get this right. The more we can create a common approach, the better.
On balance, I believe working towards implementing end-to-end encryption for all private communications is the right thing to do. Messages and calls are some of the most sensitive private conversations people have, and in a world of increasing cyber security threats and heavy-handed government intervention in many countries, people want us to take the extra step to secure their most private data. That seems right to me, as long as we take the time to build the appropriate safety systems that stop bad actors as much as we possibly can within the limits of an encrypted service. We’ve started working on these safety systems building on the work we’ve done in WhatsApp, and we’ll discuss them with experts through 2019 and beyond before fully implementing end-to-end encryption. As we learn more from those experts, we’ll finalize how to roll out these systems.
Reducing Permanence
We increasingly believe it’s important to keep information around for shorter periods of time. People want to know that what they share won’t come back to hurt them later, and reducing the length of time their information is stored and accessible will help.
One challenge in building social tools is the “permanence problem”. As we build up large collections of messages and photos over time, they can become a liability as well as an asset. For example, many people who have been on Facebook for a long time have photos from when they were younger that could be embarrassing. But people also really love keeping a record of their lives. And if all posts on Facebook and Instagram disappeared, people would lose access to a lot of valuable knowledge and experiences others have shared.
I believe there’s an opportunity to set a new standard for private communication platforms — where content automatically expires or is archived over time. Stories already expire after 24 hours unless you archive them, and that gives people the comfort to share more naturally. This philosophy could be extended to all private content.
For example, messages could be deleted after a month or a year by default. This would reduce the risk of your messages resurfacing and embarrassing you later. Of course you’d have the ability to change the timeframe or turn off auto-deletion for your threads if you wanted. And we could also provide an option for you to set individual messages to expire after a few seconds or minutes if you wanted.
It also makes sense to limit the amount of time we store messaging metadata. We use this data to run our spam and safety systems, but we don’t always need to keep it around for a long time. An important part of the solution is to collect less personal data in the first place, which is the way WhatsApp was built from the outset.
Interoperability
People want to be able to choose which service they use to communicate with people. However, today if you want to message people on Facebook you have to use Messenger, on Instagram you have to use Direct, and on WhatsApp you have to use WhatsApp. We want to give people a choice so they can reach their friends across these networks from whichever app they prefer.
We plan to start by making it possible for you to send messages to your contacts using any of our services, and then to extend that interoperability to SMS too. Of course, this would be opt-in and you will be able to keep your accounts separate if you’d like.
There are privacy and security advantages to interoperability. For example, many people use Messenger on Android to send and receive SMS texts. Those texts can’t be end-to-end encrypted because the SMS protocol is not encrypted. With the ability to message across our services, however, you’d be able to send an encrypted message to someone’s phone number in WhatsApp from Messenger.
This could also improve convenience in many experiences where people use Facebook or Instagram as their social network and WhatsApp as their preferred messaging service. For example, lots of people selling items on Marketplace list their phone number so people can message them about buying it. That’s not ideal, because you’re giving strangers your phone number. With interoperability, you’d be able to use WhatsApp to receive messages sent to your Facebook account without sharing your phone number — and the buyer wouldn’t have to worry about whether you prefer to be messaged on one network or the other.
You can imagine many simple experiences — a person discovers a business on Instagram and easily transitions to their preferred messaging app for secure payments and customer support; another person wants to catch up with a friend and can send them a message that goes to their preferred app without having to think about where that person prefers to be reached; or you simply post a story from your day across both Facebook and Instagram and can get all the replies from your friends in one place.
You can already send and receive SMS texts through Messenger on Android today, and we’d like to extend this further in the future, perhaps including the new telecom RCS standard. However, there are several issues we’ll need to work through before this will be possible. First, Apple doesn’t allow apps to interoperate with SMS on their devices, so we’d only be able to do this on Android. Second, we’d need to make sure interoperability doesn’t compromise the expectation of encryption that people already have using WhatsApp. Finally, it would create safety and spam vulnerabilities in an encrypted system to let people send messages from unknown apps where our safety and security systems couldn’t see the patterns of activity.
These are significant challenges and there are many questions here that require further consultation and discussion. But if we can implement this, we can give people more choice to use their preferred service to securely reach the people they want.
Secure Data Storage
People want to know their data is stored securely in places they trust. Looking at the future of the internet and privacy, I believe one of the most important decisions we’ll make is where we’ll build data centers and store people’s sensitive data.
There’s an important difference between providing a service in a country and storing people’s data there. As we build our infrastructure around the world, we’ve chosen not to build data centers in countries that have a track record of violating human rights like privacy or freedom of expression. If we build data centers and store sensitive data in these countries, rather than just caching non-sensitive data, it could make it easier for those governments to take people’s information.
Upholding this principle may mean that our services will get blocked in some countries, or that we won’t be able to enter others anytime soon. That’s a tradeoff we’re willing to make. We do not believe storing people’s data in some countries is a secure enough foundation to build such important internet infrastructure on.
Of course, the best way to protect the most sensitive data is not to store it at all, which is why WhatsApp doesn’t store any encryption keys and we plan to do the same with our other services going forward.
But storing data in more countries also establishes a precedent that emboldens other governments to seek greater access to their citizen’s data and therefore weakens privacy and security protections for people around the world. I think it’s important for the future of the internet and privacy that our industry continues to hold firm against storing people’s data in places where it won’t be secure.
Next Steps
Over the next year and beyond, there are a lot more details and trade-offs to work through related to each of these principles. A lot of this work is in the early stages, and we are committed to consulting with experts, advocates, industry partners, and governments — including law enforcement and regulators — around the world to get these decisions right.
At the same time, working through these principles is only the first step in building out a privacy-focused social platform. Beyond that, significant thought needs to go into all of the services we build on top of that foundation — from how people do payments and financial transactions, to the role of businesses and advertising, to how we can offer a platform for other private services.
But these initial questions are critical to get right. If we do this well, we can create platforms for private sharing that could be even more important to people than the platforms we’ve already built to help people share and connect more openly.
Doing this means taking positions on some of the most important issues facing the future of the internet. As a society, we have an opportunity to set out where we stand, to decide how we value private communications, and who gets to decide how long and where data should be stored.
I believe we should be working towards a world where people can speak privately and live freely knowing that their information will only be seen by who they want to see it and won’t all stick around forever. If we can help move the world in this direction, I will be proud of the difference we’ve made.
0 notes
Text
Zuckerberg wants messages to auto-expire to make Facebook a “living room”
On feed-based “broader social networks, where people can accumulate friends or followers until the services feel more public . . . it feels more like a town square than a more intimate space like a living room” Facebook CEO Mark Zuckerberg explained in a blog post today. With messaging, groups, and ephemeral stories as the fastest growing social features, Zuckerberg laid out why he’s rethinking Facebook as a private living room where people can be comfortable being themselves without fear of hackers, government spying, and embarrassment from old content — all without encryption allowing bad actors to hide their crimes.
Perhaps this will just be more lip service in a time of PR crisis for Facebook. But with the business imperative fueled by social networking’s shift away from permanent feed broadcasting, Facebook can espouse the philosophy of privacy while in reality servicing its shareholders and bottom line. It’s this alignment that actually spurs product change. We saw Facebook’s agility with last year’s realization that a misinformation- and hate-plagued platform wouldn’t survive long-term so it had to triple its security and moderation staff. And in 2017, recognizing the threat of Stories, it implemented them across its apps. Now Facebook might finally see the dollar signs within privacy.
The New York Times’ Mike Isaac recently reported that Facebook planned to unify its Facebook, WhatsApp, and Instagram messaging infrastructure to allow cross-app messaging and end-to-end encryption. And Zuckerberg discussed this and the value of ephemerality on the recent earnings call. But now Zuckerbeg has roadmapped a clearer slate of changes and policies to turn Facebook into a living room:
-Facebook will let users opt in to the ability to send or receive messages across Facebook, WhatsApp, and Instagram
-Facebook wants to expand that interoperability to SMS on Android
-Zuckerberg wants to make ephemerality automatic on messaging threads, so chats disappear by default after a month or year, with users able to control that or put timers on individual messages.
-Facebook plans to limit how long it retains metadata on messages once it’s no longer needed for spam or safety protections
-Facebook will extend end-to-end encryption across its messaging apps but use metadata and other non-content signals to weed out criminals using privacy to hide their misdeeds.
-Facebook won’t store data in countries with a bad track record of privacy abuse such as Russia, even if that means having to shut down or postpone operations in a country
You can read the full blog post from Zuckerberg below:
Posted by Mark Zuckerberg on Wednesday, March 6, 2019
A Privacy-Focused Vision for Social Networking
My focus for the last couple of years has been understanding and addressing the biggest challenges facing Facebook. This means taking positions on important issues concerning the future of the internet. In this note, I’ll outline our vision and principles around building a privacy-focused messaging and social networking platform. There’s a lot to do here, and we’re committed to working openly and consulting with experts across society as we develop this.
—
Over the last 15 years, Facebook and Instagram have helped people connect with friends, communities, and interests in the digital equivalent of a town square. But people increasingly also want to connect privately in the digital equivalent of the living room. As I think about the future of the internet, I believe a privacy-focused communications platform will become even more important than today’s open platforms. Privacy gives people the freedom to be themselves and connect more naturally, which is why we build social networks.
Today we already see that private messaging, ephemeral stories, and small groups are by far the fastest growing areas of online communication. There are a number of reasons for this. Many people prefer the intimacy of communicating one-on-one or with just a few friends. People are more cautious of having a permanent record of what they’ve shared. And we all expect to be able to do things like payments privately and securely.
Public social networks will continue to be very important in people’s lives — for connecting with everyone you know, discovering new people, ideas and content, and giving people a voice more broadly. People find these valuable every day, and there are still a lot of useful services to build on top of them. But now, with all the ways people also want to interact privately, there’s also an opportunity to build a simpler platform that’s focused on privacy first.
I understand that many people don’t think Facebook can or would even want to build this kind of privacy-focused platform — because frankly we don’t currently have a strong reputation for building privacy protective services, and we’ve historically focused on tools for more open sharing. But we’ve repeatedly shown that we can evolve to build the services that people really want, including in private messaging and stories.
I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won’t stick around forever. This is the future I hope we will help bring about.
We plan to build this the way we’ve developed WhatsApp: focus on the most fundamental and private use case — messaging — make it as secure as possible, and then build more ways for people to interact on top of that, including calls, video chats, groups, stories, businesses, payments, commerce, and ultimately a platform for many other kinds of private services.
This privacy-focused platform will be built around several principles:
Private interactions. People should have simple, intimate places where they have clear control over who can communicate with them and confidence that no one else can access what they share.
Encryption. People’s private communications should be secure. End-to-end encryption prevents anyone — including us — from seeing what people share on our services.
Permanence. People should be comfortable being themselves, and should not have to worry about what they share coming back to hurt them later. So we won’t keep messages or stories around for longer than necessary to deliver the service or longer than people want it.
Safety. People should expect that we will do everything we can to keep them safe on our services within the limits of what’s possible in an encrypted service.
Interoperability. People should be able to use any of our apps to reach their friends, and they should be able to communicate across networks easily and securely.
Secure data storage. People should expect that we won’t store sensitive data in countries with weak records on human rights like privacy and freedom of expression in order to protect data from being improperly accessed.
Over the next few years, we plan to rebuild more of our services around these ideas. The decisions we’ll face along the way will mean taking positions on important issues concerning the future of the internet. We understand there are a lot of tradeoffs to get right, and we’re committed to consulting with experts and discussing the best way forward. This will take some time, but we’re not going to develop this major change in our direction behind closed doors. We’re going to do this as openly and collaboratively as we can because many of these issues affect different parts of society.
Private Interactions as a Foundation
For a service to feel private, there must never be any doubt about who you are communicating with. We’ve worked hard to build privacy into all our products, including those for public sharing. But one great property of messaging services is that even as your contacts list grows, your individual threads and groups remain private. As your friends evolve over time, messaging services evolve gracefully and remain intimate.
This is different from broader social networks, where people can accumulate friends or followers until the services feel more public. This is well-suited to many important uses — telling all your friends about something, using your voice on important topics, finding communities of people with similar interests, following creators and media, buying and selling things, organizing fundraisers, growing businesses, or many other things that benefit from having everyone you know in one place. Still, when you see all these experiences together, it feels more like a town square than a more intimate space like a living room.
There is an opportunity to build a platform that focuses on all of the ways people want to interact privately. This sense of privacy and intimacy is not just about technical features — it is designed deeply into the feel of the service overall. In WhatsApp, for example, our team is obsessed with creating an intimate environment in every aspect of the product. Even where we’ve built features that allow for broader sharing, it’s still a less public experience. When the team built groups, they put in a size limit to make sure every interaction felt private. When we shipped stories on WhatsApp, we limited public content because we worried it might erode the feeling of privacy to see lots of public content — even if it didn’t actually change who you’re sharing with.
In a few years, I expect future versions of Messenger and WhatsApp to become the main ways people communicate on the Facebook network. We’re focused on making both of these apps faster, simpler, more private and more secure, including with end-to-end encryption. We then plan to add more ways to interact privately with your friends, groups, and businesses. If this evolution is successful, interacting with your friends and family across the Facebook network will become a fundamentally more private experience.
Encryption and Safety
People expect their private communications to be secure and to only be seen by the people they’ve sent them to — not hackers, criminals, over-reaching governments, or even the people operating the services they’re using.
There is a growing awareness that the more entities that have access to your data, the more vulnerabilities there are for someone to misuse it or for a cyber attack to expose it. There is also a growing concern among some that technology may be centralizing power in the hands of governments and companies like ours. And some people worry that our services could access their messages and use them for advertising or in other ways they don’t expect.
End-to-end encryption is an important tool in developing a privacy-focused social network. Encryption is decentralizing — it limits services like ours from seeing the content flowing through them and makes it much harder for anyone else to access your information. This is why encryption is an increasingly important part of our online lives, from banking to healthcare services. It’s also why we built end-to-end encryption into WhatsApp after we acquired it.
In the last year, I’ve spoken with dissidents who’ve told me encryption is the reason they are free, or even alive. Governments often make unlawful demands for data, and while we push back and fight these requests in court, there’s always a risk we’ll lose a case — and if the information isn’t encrypted we’d either have to turn over the data or risk our employees being arrested if we failed to comply. This may seem extreme, but we’ve had a case where one of our employees was actually jailed for not providing access to someone’s private information even though we couldn’t access it since it was encrypted.
At the same time, there are real safety concerns to address before we can implement end-to-end encryption across all of our messaging services. Encryption is a powerful tool for privacy, but that includes the privacy of people doing bad things. When billions of people use a service to connect, some of them are going to misuse it for truly terrible things like child exploitation, terrorism, and extortion. We have a responsibility to work with law enforcement and to help prevent these wherever we can. We are working to improve our ability to identify and stop bad actors across our apps by detecting patterns of activity or through other means, even when we can’t see the content of the messages, and we will continue to invest in this work. But we face an inherent tradeoff because we will never find all of the potential harm we do today when our security systems can see the messages themselves.
Finding the right ways to protect both privacy and safety is something societies have historically grappled with. There are still many open questions here and we’ll consult with safety experts, law enforcement and governments on the best ways to implement safety measures. We’ll also need to work together with other platforms to make sure that as an industry we get this right. The more we can create a common approach, the better.
On balance, I believe working towards implementing end-to-end encryption for all private communications is the right thing to do. Messages and calls are some of the most sensitive private conversations people have, and in a world of increasing cyber security threats and heavy-handed government intervention in many countries, people want us to take the extra step to secure their most private data. That seems right to me, as long as we take the time to build the appropriate safety systems that stop bad actors as much as we possibly can within the limits of an encrypted service. We’ve started working on these safety systems building on the work we’ve done in WhatsApp, and we’ll discuss them with experts through 2019 and beyond before fully implementing end-to-end encryption. As we learn more from those experts, we’ll finalize how to roll out these systems.
Reducing Permanence
We increasingly believe it’s important to keep information around for shorter periods of time. People want to know that what they share won’t come back to hurt them later, and reducing the length of time their information is stored and accessible will help.
One challenge in building social tools is the “permanence problem”. As we build up large collections of messages and photos over time, they can become a liability as well as an asset. For example, many people who have been on Facebook for a long time have photos from when they were younger that could be embarrassing. But people also really love keeping a record of their lives. And if all posts on Facebook and Instagram disappeared, people would lose access to a lot of valuable knowledge and experiences others have shared.
I believe there’s an opportunity to set a new standard for private communication platforms — where content automatically expires or is archived over time. Stories already expire after 24 hours unless you archive them, and that gives people the comfort to share more naturally. This philosophy could be extended to all private content.
For example, messages could be deleted after a month or a year by default. This would reduce the risk of your messages resurfacing and embarrassing you later. Of course you’d have the ability to change the timeframe or turn off auto-deletion for your threads if you wanted. And we could also provide an option for you to set individual messages to expire after a few seconds or minutes if you wanted.
It also makes sense to limit the amount of time we store messaging metadata. We use this data to run our spam and safety systems, but we don’t always need to keep it around for a long time. An important part of the solution is to collect less personal data in the first place, which is the way WhatsApp was built from the outset.
Interoperability
People want to be able to choose which service they use to communicate with people. However, today if you want to message people on Facebook you have to use Messenger, on Instagram you have to use Direct, and on WhatsApp you have to use WhatsApp. We want to give people a choice so they can reach their friends across these networks from whichever app they prefer.
We plan to start by making it possible for you to send messages to your contacts using any of our services, and then to extend that interoperability to SMS too. Of course, this would be opt-in and you will be able to keep your accounts separate if you’d like.
There are privacy and security advantages to interoperability. For example, many people use Messenger on Android to send and receive SMS texts. Those texts can’t be end-to-end encrypted because the SMS protocol is not encrypted. With the ability to message across our services, however, you’d be able to send an encrypted message to someone’s phone number in WhatsApp from Messenger.
This could also improve convenience in many experiences where people use Facebook or Instagram as their social network and WhatsApp as their preferred messaging service. For example, lots of people selling items on Marketplace list their phone number so people can message them about buying it. That’s not ideal, because you’re giving strangers your phone number. With interoperability, you’d be able to use WhatsApp to receive messages sent to your Facebook account without sharing your phone number — and the buyer wouldn’t have to worry about whether you prefer to be messaged on one network or the other.
You can imagine many simple experiences — a person discovers a business on Instagram and easily transitions to their preferred messaging app for secure payments and customer support; another person wants to catch up with a friend and can send them a message that goes to their preferred app without having to think about where that person prefers to be reached; or you simply post a story from your day across both Facebook and Instagram and can get all the replies from your friends in one place.
You can already send and receive SMS texts through Messenger on Android today, and we’d like to extend this further in the future, perhaps including the new telecom RCS standard. However, there are several issues we’ll need to work through before this will be possible. First, Apple doesn’t allow apps to interoperate with SMS on their devices, so we’d only be able to do this on Android. Second, we’d need to make sure interoperability doesn’t compromise the expectation of encryption that people already have using WhatsApp. Finally, it would create safety and spam vulnerabilities in an encrypted system to let people send messages from unknown apps where our safety and security systems couldn’t see the patterns of activity.
These are significant challenges and there are many questions here that require further consultation and discussion. But if we can implement this, we can give people more choice to use their preferred service to securely reach the people they want.
Secure Data Storage
People want to know their data is stored securely in places they trust. Looking at the future of the internet and privacy, I believe one of the most important decisions we’ll make is where we’ll build data centers and store people’s sensitive data.
There’s an important difference between providing a service in a country and storing people’s data there. As we build our infrastructure around the world, we’ve chosen not to build data centers in countries that have a track record of violating human rights like privacy or freedom of expression. If we build data centers and store sensitive data in these countries, rather than just caching non-sensitive data, it could make it easier for those governments to take people’s information.
Upholding this principle may mean that our services will get blocked in some countries, or that we won’t be able to enter others anytime soon. That’s a tradeoff we’re willing to make. We do not believe storing people’s data in some countries is a secure enough foundation to build such important internet infrastructure on.
Of course, the best way to protect the most sensitive data is not to store it at all, which is why WhatsApp doesn’t store any encryption keys and we plan to do the same with our other services going forward.
But storing data in more countries also establishes a precedent that emboldens other governments to seek greater access to their citizen’s data and therefore weakens privacy and security protections for people around the world. I think it’s important for the future of the internet and privacy that our industry continues to hold firm against storing people’s data in places where it won’t be secure.
Next Steps
Over the next year and beyond, there are a lot more details and tradeoffs to work through related to each of these principles. A lot of this work is in the early stages, and we are committed to consulting with experts, advocates, industry partners, and governments — including law enforcement and regulators — around the world to get these decisions right.
At the same time, working through these principles is only the first step in building out a privacy-focused social platform. Beyond that, significant thought needs to go into all of the services we build on top of that foundation — from how people do payments and financial transactions, to the role of businesses and advertising, to how we can offer a platform for other private services.
But these initial questions are critical to get right. If we do this well, we can create platforms for private sharing that could be even more important to people than the platforms we’ve already built to help people share and connect more openly.
Doing this means taking positions on some of the most important issues facing the future of the internet. As a society, we have an opportunity to set out where we stand, to decide how we value private communications, and who gets to decide how long and where data should be stored.
I believe we should be working towards a world where people can speak privately and live freely knowing that their information will only be seen by who they want to see it and won’t all stick around forever. If we can help move the world in this direction, I will be proud of the difference we’ve made.
from iraidajzsmmwtv https://ift.tt/2J5UdZo via IFTTT
0 notes
Link
On feed-based “broader social networks, where people can accumulate friends or followers until the services feel more public . . . it feels more like a town square than a more intimate space like a living room” Facebook CEO Mark Zuckerberg explained in a blog post today. With messaging, groups, and ephemeral stories as the fastest growing social features, Zuckerberg laid out why he’s rethinking Facebook as a private living room where people can be comfortable being themselves without fear of hackers, government spying, and embarrassment from old content — all without encryption allowing bad actors to hide their crimes.
Perhaps this will just be more lip service in a time of PR crisis for Facebook. But with the business imperative fueled by social networking’s shift away from permanent feed broadcasting, Facebook can espouse the philosophy of privacy while in reality servicing its shareholders and bottom line. It’s this alignment that actually spurs product change. We saw Facebook’s agility with last year’s realization that a misinformation- and hate-plagued platform wouldn’t survive long-term so it had to triple its security and moderation staff. And in 2017, recognizing the threat of Stories, it implemented them across its apps. Now Facebook might finally see the dollar signs within privacy.
The New York Times’ Mike Isaac recently reported that Facebook planned to unify its Facebook, WhatsApp, and Instagram messaging infrastructure to allow cross-app messaging and end-to-end encryption. And Zuckerberg discussed this and the value of ephemerality on the recent earnings call. But now Zuckerbeg has roadmapped a clearer slate of changes and policies to turn Facebook into a living room:
-Facebook will let users opt in to the ability to send or receive messages across Facebook, WhatsApp, and Instagram
-Facebook wants to expand that interoperability to SMS on Android
-Zuckerberg wants to make ephemerality automatic on messaging threads, so chats disappear by default after a month or year, with users able to control that or put timers on individual messages.
-Facebook plans to limit how long it retains metadata on messages once it’s no longer needed for spam or safety protections
-Facebook will extend end-to-end encryption across its messaging apps but use metadata and other non-content signals to weed out criminals using privacy to hide their misdeeds.
-Facebook won’t store data in countries with a bad track record of privacy abuse such as Russia, even if that means having to shut down or postpone operations in a country
You can read the full blog post from Zuckerberg below:
Posted by Mark Zuckerberg on Wednesday, March 6, 2019
A Privacy-Focused Vision for Social Networking
My focus for the last couple of years has been understanding and addressing the biggest challenges facing Facebook. This means taking positions on important issues concerning the future of the internet. In this note, I’ll outline our vision and principles around building a privacy-focused messaging and social networking platform. There’s a lot to do here, and we’re committed to working openly and consulting with experts across society as we develop this.
—
Over the last 15 years, Facebook and Instagram have helped people connect with friends, communities, and interests in the digital equivalent of a town square. But people increasingly also want to connect privately in the digital equivalent of the living room. As I think about the future of the internet, I believe a privacy-focused communications platform will become even more important than today’s open platforms. Privacy gives people the freedom to be themselves and connect more naturally, which is why we build social networks.
Today we already see that private messaging, ephemeral stories, and small groups are by far the fastest growing areas of online communication. There are a number of reasons for this. Many people prefer the intimacy of communicating one-on-one or with just a few friends. People are more cautious of having a permanent record of what they’ve shared. And we all expect to be able to do things like payments privately and securely.
Public social networks will continue to be very important in people’s lives — for connecting with everyone you know, discovering new people, ideas and content, and giving people a voice more broadly. People find these valuable every day, and there are still a lot of useful services to build on top of them. But now, with all the ways people also want to interact privately, there’s also an opportunity to build a simpler platform that’s focused on privacy first.
I understand that many people don’t think Facebook can or would even want to build this kind of privacy-focused platform — because frankly we don’t currently have a strong reputation for building privacy protective services, and we’ve historically focused on tools for more open sharing. But we’ve repeatedly shown that we can evolve to build the services that people really want, including in private messaging and stories.
I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won’t stick around forever. This is the future I hope we will help bring about.
We plan to build this the way we’ve developed WhatsApp: focus on the most fundamental and private use case — messaging — make it as secure as possible, and then build more ways for people to interact on top of that, including calls, video chats, groups, stories, businesses, payments, commerce, and ultimately a platform for many other kinds of private services.
This privacy-focused platform will be built around several principles:
Private interactions. People should have simple, intimate places where they have clear control over who can communicate with them and confidence that no one else can access what they share.
Encryption. People’s private communications should be secure. End-to-end encryption prevents anyone — including us — from seeing what people share on our services.
Permanence. People should be comfortable being themselves, and should not have to worry about what they share coming back to hurt them later. So we won’t keep messages or stories around for longer than necessary to deliver the service or longer than people want it.
Safety. People should expect that we will do everything we can to keep them safe on our services within the limits of what’s possible in an encrypted service.
Interoperability. People should be able to use any of our apps to reach their friends, and they should be able to communicate across networks easily and securely.
Secure data storage. People should expect that we won’t store sensitive data in countries with weak records on human rights like privacy and freedom of expression in order to protect data from being improperly accessed.
Over the next few years, we plan to rebuild more of our services around these ideas. The decisions we’ll face along the way will mean taking positions on important issues concerning the future of the internet. We understand there are a lot of tradeoffs to get right, and we’re committed to consulting with experts and discussing the best way forward. This will take some time, but we’re not going to develop this major change in our direction behind closed doors. We’re going to do this as openly and collaboratively as we can because many of these issues affect different parts of society.
Private Interactions as a Foundation
For a service to feel private, there must never be any doubt about who you are communicating with. We’ve worked hard to build privacy into all our products, including those for public sharing. But one great property of messaging services is that even as your contacts list grows, your individual threads and groups remain private. As your friends evolve over time, messaging services evolve gracefully and remain intimate.
This is different from broader social networks, where people can accumulate friends or followers until the services feel more public. This is well-suited to many important uses — telling all your friends about something, using your voice on important topics, finding communities of people with similar interests, following creators and media, buying and selling things, organizing fundraisers, growing businesses, or many other things that benefit from having everyone you know in one place. Still, when you see all these experiences together, it feels more like a town square than a more intimate space like a living room.
There is an opportunity to build a platform that focuses on all of the ways people want to interact privately. This sense of privacy and intimacy is not just about technical features — it is designed deeply into the feel of the service overall. In WhatsApp, for example, our team is obsessed with creating an intimate environment in every aspect of the product. Even where we’ve built features that allow for broader sharing, it’s still a less public experience. When the team built groups, they put in a size limit to make sure every interaction felt private. When we shipped stories on WhatsApp, we limited public content because we worried it might erode the feeling of privacy to see lots of public content — even if it didn’t actually change who you’re sharing with.
In a few years, I expect future versions of Messenger and WhatsApp to become the main ways people communicate on the Facebook network. We’re focused on making both of these apps faster, simpler, more private and more secure, including with end-to-end encryption. We then plan to add more ways to interact privately with your friends, groups, and businesses. If this evolution is successful, interacting with your friends and family across the Facebook network will become a fundamentally more private experience.
Encryption and Safety
People expect their private communications to be secure and to only be seen by the people they’ve sent them to — not hackers, criminals, over-reaching governments, or even the people operating the services they’re using.
There is a growing awareness that the more entities that have access to your data, the more vulnerabilities there are for someone to misuse it or for a cyber attack to expose it. There is also a growing concern among some that technology may be centralizing power in the hands of governments and companies like ours. And some people worry that our services could access their messages and use them for advertising or in other ways they don’t expect.
End-to-end encryption is an important tool in developing a privacy-focused social network. Encryption is decentralizing — it limits services like ours from seeing the content flowing through them and makes it much harder for anyone else to access your information. This is why encryption is an increasingly important part of our online lives, from banking to healthcare services. It’s also why we built end-to-end encryption into WhatsApp after we acquired it.
In the last year, I’ve spoken with dissidents who’ve told me encryption is the reason they are free, or even alive. Governments often make unlawful demands for data, and while we push back and fight these requests in court, there’s always a risk we’ll lose a case — and if the information isn’t encrypted we’d either have to turn over the data or risk our employees being arrested if we failed to comply. This may seem extreme, but we’ve had a case where one of our employees was actually jailed for not providing access to someone’s private information even though we couldn’t access it since it was encrypted.
At the same time, there are real safety concerns to address before we can implement end-to-end encryption across all of our messaging services. Encryption is a powerful tool for privacy, but that includes the privacy of people doing bad things. When billions of people use a service to connect, some of them are going to misuse it for truly terrible things like child exploitation, terrorism, and extortion. We have a responsibility to work with law enforcement and to help prevent these wherever we can. We are working to improve our ability to identify and stop bad actors across our apps by detecting patterns of activity or through other means, even when we can’t see the content of the messages, and we will continue to invest in this work. But we face an inherent tradeoff because we will never find all of the potential harm we do today when our security systems can see the messages themselves.
Finding the right ways to protect both privacy and safety is something societies have historically grappled with. There are still many open questions here and we’ll consult with safety experts, law enforcement and governments on the best ways to implement safety measures. We’ll also need to work together with other platforms to make sure that as an industry we get this right. The more we can create a common approach, the better.
On balance, I believe working towards implementing end-to-end encryption for all private communications is the right thing to do. Messages and calls are some of the most sensitive private conversations people have, and in a world of increasing cyber security threats and heavy-handed government intervention in many countries, people want us to take the extra step to secure their most private data. That seems right to me, as long as we take the time to build the appropriate safety systems that stop bad actors as much as we possibly can within the limits of an encrypted service. We’ve started working on these safety systems building on the work we’ve done in WhatsApp, and we’ll discuss them with experts through 2019 and beyond before fully implementing end-to-end encryption. As we learn more from those experts, we’ll finalize how to roll out these systems.
Reducing Permanence
We increasingly believe it’s important to keep information around for shorter periods of time. People want to know that what they share won’t come back to hurt them later, and reducing the length of time their information is stored and accessible will help.
One challenge in building social tools is the “permanence problem”. As we build up large collections of messages and photos over time, they can become a liability as well as an asset. For example, many people who have been on Facebook for a long time have photos from when they were younger that could be embarrassing. But people also really love keeping a record of their lives. And if all posts on Facebook and Instagram disappeared, people would lose access to a lot of valuable knowledge and experiences others have shared.
I believe there’s an opportunity to set a new standard for private communication platforms — where content automatically expires or is archived over time. Stories already expire after 24 hours unless you archive them, and that gives people the comfort to share more naturally. This philosophy could be extended to all private content.
For example, messages could be deleted after a month or a year by default. This would reduce the risk of your messages resurfacing and embarrassing you later. Of course you’d have the ability to change the timeframe or turn off auto-deletion for your threads if you wanted. And we could also provide an option for you to set individual messages to expire after a few seconds or minutes if you wanted.
It also makes sense to limit the amount of time we store messaging metadata. We use this data to run our spam and safety systems, but we don’t always need to keep it around for a long time. An important part of the solution is to collect less personal data in the first place, which is the way WhatsApp was built from the outset.
Interoperability
People want to be able to choose which service they use to communicate with people. However, today if you want to message people on Facebook you have to use Messenger, on Instagram you have to use Direct, and on WhatsApp you have to use WhatsApp. We want to give people a choice so they can reach their friends across these networks from whichever app they prefer.
We plan to start by making it possible for you to send messages to your contacts using any of our services, and then to extend that interoperability to SMS too. Of course, this would be opt-in and you will be able to keep your accounts separate if you’d like.
There are privacy and security advantages to interoperability. For example, many people use Messenger on Android to send and receive SMS texts. Those texts can’t be end-to-end encrypted because the SMS protocol is not encrypted. With the ability to message across our services, however, you’d be able to send an encrypted message to someone’s phone number in WhatsApp from Messenger.
This could also improve convenience in many experiences where people use Facebook or Instagram as their social network and WhatsApp as their preferred messaging service. For example, lots of people selling items on Marketplace list their phone number so people can message them about buying it. That’s not ideal, because you’re giving strangers your phone number. With interoperability, you’d be able to use WhatsApp to receive messages sent to your Facebook account without sharing your phone number — and the buyer wouldn’t have to worry about whether you prefer to be messaged on one network or the other.
You can imagine many simple experiences — a person discovers a business on Instagram and easily transitions to their preferred messaging app for secure payments and customer support; another person wants to catch up with a friend and can send them a message that goes to their preferred app without having to think about where that person prefers to be reached; or you simply post a story from your day across both Facebook and Instagram and can get all the replies from your friends in one place.
You can already send and receive SMS texts through Messenger on Android today, and we’d like to extend this further in the future, perhaps including the new telecom RCS standard. However, there are several issues we’ll need to work through before this will be possible. First, Apple doesn’t allow apps to interoperate with SMS on their devices, so we’d only be able to do this on Android. Second, we’d need to make sure interoperability doesn’t compromise the expectation of encryption that people already have using WhatsApp. Finally, it would create safety and spam vulnerabilities in an encrypted system to let people send messages from unknown apps where our safety and security systems couldn’t see the patterns of activity.
These are significant challenges and there are many questions here that require further consultation and discussion. But if we can implement this, we can give people more choice to use their preferred service to securely reach the people they want.
Secure Data Storage
People want to know their data is stored securely in places they trust. Looking at the future of the internet and privacy, I believe one of the most important decisions we’ll make is where we’ll build data centers and store people’s sensitive data.
There’s an important difference between providing a service in a country and storing people’s data there. As we build our infrastructure around the world, we’ve chosen not to build data centers in countries that have a track record of violating human rights like privacy or freedom of expression. If we build data centers and store sensitive data in these countries, rather than just caching non-sensitive data, it could make it easier for those governments to take people’s information.
Upholding this principle may mean that our services will get blocked in some countries, or that we won’t be able to enter others anytime soon. That’s a tradeoff we’re willing to make. We do not believe storing people’s data in some countries is a secure enough foundation to build such important internet infrastructure on.
Of course, the best way to protect the most sensitive data is not to store it at all, which is why WhatsApp doesn’t store any encryption keys and we plan to do the same with our other services going forward.
But storing data in more countries also establishes a precedent that emboldens other governments to seek greater access to their citizen’s data and therefore weakens privacy and security protections for people around the world. I think it’s important for the future of the internet and privacy that our industry continues to hold firm against storing people’s data in places where it won’t be secure.
Next Steps
Over the next year and beyond, there are a lot more details and tradeoffs to work through related to each of these principles. A lot of this work is in the early stages, and we are committed to consulting with experts, advocates, industry partners, and governments — including law enforcement and regulators — around the world to get these decisions right.
At the same time, working through these principles is only the first step in building out a privacy-focused social platform. Beyond that, significant thought needs to go into all of the services we build on top of that foundation — from how people do payments and financial transactions, to the role of businesses and advertising, to how we can offer a platform for other private services.
But these initial questions are critical to get right. If we do this well, we can create platforms for private sharing that could be even more important to people than the platforms we’ve already built to help people share and connect more openly.
Doing this means taking positions on some of the most important issues facing the future of the internet. As a society, we have an opportunity to set out where we stand, to decide how we value private communications, and who gets to decide how long and where data should be stored.
I believe we should be working towards a world where people can speak privately and live freely knowing that their information will only be seen by who they want to see it and won’t all stick around forever. If we can help move the world in this direction, I will be proud of the difference we’ve made.
from Social – TechCrunch https://ift.tt/2J5UdZo Original Content From: https://techcrunch.com
0 notes
Text
Zuckerberg wants messages to auto-expire to make Facebook a “living room”
On feed-based “broader social networks, where people can accumulate friends or followers until the services feel more public . . . it feels more like a town square than a more intimate space like a living room” Facebook CEO Mark Zuckerberg explained in a blog post today. With messaging, groups, and ephemeral stories as the fastest growing social features, Zuckerberg laid out why he’s rethinking Facebook as a private living room where people can be comfortable being themselves without fear of hackers, government spying, and embarrassment from old content — all without encryption allowing bad actors to hide their crimes.
Perhaps this will just be more lip service in a time of PR crisis for Facebook. But with the business imperative fueled by social networking’s shift away from permanent feed broadcasting, Facebook can espouse the philosophy of privacy while in reality servicing its shareholders and bottom line. It’s this alignment that actually spurs product change. We saw Facebook’s agility with last year’s realization that a misinformation- and hate-plagued platform wouldn’t survive long-term so it had to triple its security and moderation staff. And in 2017, recognizing the threat of Stories, it implemented them across its apps. Now Facebook might finally see the dollar signs within privacy.
The New York Times’ Mike Isaac recently reported that Facebook planned to unify its Facebook, WhatsApp, and Instagram messaging infrastructure to allow cross-app messaging and end-to-end encryption. And Zuckerberg discussed this and the value of ephemerality on the recent earnings call. But now Zuckerbeg has roadmapped a clearer slate of changes and policies to turn Facebook into a living room:
-Facebook will let users opt in to the ability to send or receive messages across Facebook, WhatsApp, and Instagram
-Facebook wants to expand that interoperability to SMS on Android
-Zuckerberg wants to make ephemerality automatic on messaging threads, so chats disappear by default after a month or year, with users able to control that or put timers on individual messages.
-Facebook plans to limit how long it retains metadata on messages once it’s no longer needed for spam or safety protections
-Facebook will extend end-to-end encryption across its messaging apps but use metadata and other non-content signals to weed out criminals using privacy to hide their misdeeds.
-Facebook won’t store data in countries with a bad track record of privacy abuse such as Russia, even if that means having to shut down or postpone operations in a country
You can read the full blog post from Zuckerberg below:
Posted by Mark Zuckerberg on Wednesday, March 6, 2019
A Privacy-Focused Vision for Social Networking
My focus for the last couple of years has been understanding and addressing the biggest challenges facing Facebook. This means taking positions on important issues concerning the future of the internet. In this note, I’ll outline our vision and principles around building a privacy-focused messaging and social networking platform. There’s a lot to do here, and we’re committed to working openly and consulting with experts across society as we develop this.
—
Over the last 15 years, Facebook and Instagram have helped people connect with friends, communities, and interests in the digital equivalent of a town square. But people increasingly also want to connect privately in the digital equivalent of the living room. As I think about the future of the internet, I believe a privacy-focused communications platform will become even more important than today’s open platforms. Privacy gives people the freedom to be themselves and connect more naturally, which is why we build social networks.
Today we already see that private messaging, ephemeral stories, and small groups are by far the fastest growing areas of online communication. There are a number of reasons for this. Many people prefer the intimacy of communicating one-on-one or with just a few friends. People are more cautious of having a permanent record of what they’ve shared. And we all expect to be able to do things like payments privately and securely.
Public social networks will continue to be very important in people’s lives — for connecting with everyone you know, discovering new people, ideas and content, and giving people a voice more broadly. People find these valuable every day, and there are still a lot of useful services to build on top of them. But now, with all the ways people also want to interact privately, there’s also an opportunity to build a simpler platform that’s focused on privacy first.
I understand that many people don’t think Facebook can or would even want to build this kind of privacy-focused platform — because frankly we don’t currently have a strong reputation for building privacy protective services, and we’ve historically focused on tools for more open sharing. But we’ve repeatedly shown that we can evolve to build the services that people really want, including in private messaging and stories.
I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won’t stick around forever. This is the future I hope we will help bring about.
We plan to build this the way we’ve developed WhatsApp: focus on the most fundamental and private use case — messaging — make it as secure as possible, and then build more ways for people to interact on top of that, including calls, video chats, groups, stories, businesses, payments, commerce, and ultimately a platform for many other kinds of private services.
This privacy-focused platform will be built around several principles:
Private interactions. People should have simple, intimate places where they have clear control over who can communicate with them and confidence that no one else can access what they share.
Encryption. People’s private communications should be secure. End-to-end encryption prevents anyone — including us — from seeing what people share on our services.
Permanence. People should be comfortable being themselves, and should not have to worry about what they share coming back to hurt them later. So we won’t keep messages or stories around for longer than necessary to deliver the service or longer than people want it.
Safety. People should expect that we will do everything we can to keep them safe on our services within the limits of what’s possible in an encrypted service.
Interoperability. People should be able to use any of our apps to reach their friends, and they should be able to communicate across networks easily and securely.
Secure data storage. People should expect that we won’t store sensitive data in countries with weak records on human rights like privacy and freedom of expression in order to protect data from being improperly accessed.
Over the next few years, we plan to rebuild more of our services around these ideas. The decisions we’ll face along the way will mean taking positions on important issues concerning the future of the internet. We understand there are a lot of tradeoffs to get right, and we’re committed to consulting with experts and discussing the best way forward. This will take some time, but we’re not going to develop this major change in our direction behind closed doors. We’re going to do this as openly and collaboratively as we can because many of these issues affect different parts of society.
Private Interactions as a Foundation
For a service to feel private, there must never be any doubt about who you are communicating with. We’ve worked hard to build privacy into all our products, including those for public sharing. But one great property of messaging services is that even as your contacts list grows, your individual threads and groups remain private. As your friends evolve over time, messaging services evolve gracefully and remain intimate.
This is different from broader social networks, where people can accumulate friends or followers until the services feel more public. This is well-suited to many important uses — telling all your friends about something, using your voice on important topics, finding communities of people with similar interests, following creators and media, buying and selling things, organizing fundraisers, growing businesses, or many other things that benefit from having everyone you know in one place. Still, when you see all these experiences together, it feels more like a town square than a more intimate space like a living room.
There is an opportunity to build a platform that focuses on all of the ways people want to interact privately. This sense of privacy and intimacy is not just about technical features — it is designed deeply into the feel of the service overall. In WhatsApp, for example, our team is obsessed with creating an intimate environment in every aspect of the product. Even where we’ve built features that allow for broader sharing, it’s still a less public experience. When the team built groups, they put in a size limit to make sure every interaction felt private. When we shipped stories on WhatsApp, we limited public content because we worried it might erode the feeling of privacy to see lots of public content — even if it didn’t actually change who you’re sharing with.
In a few years, I expect future versions of Messenger and WhatsApp to become the main ways people communicate on the Facebook network. We’re focused on making both of these apps faster, simpler, more private and more secure, including with end-to-end encryption. We then plan to add more ways to interact privately with your friends, groups, and businesses. If this evolution is successful, interacting with your friends and family across the Facebook network will become a fundamentally more private experience.
Encryption and Safety
People expect their private communications to be secure and to only be seen by the people they’ve sent them to — not hackers, criminals, over-reaching governments, or even the people operating the services they’re using.
There is a growing awareness that the more entities that have access to your data, the more vulnerabilities there are for someone to misuse it or for a cyber attack to expose it. There is also a growing concern among some that technology may be centralizing power in the hands of governments and companies like ours. And some people worry that our services could access their messages and use them for advertising or in other ways they don’t expect.
End-to-end encryption is an important tool in developing a privacy-focused social network. Encryption is decentralizing — it limits services like ours from seeing the content flowing through them and makes it much harder for anyone else to access your information. This is why encryption is an increasingly important part of our online lives, from banking to healthcare services. It’s also why we built end-to-end encryption into WhatsApp after we acquired it.
In the last year, I’ve spoken with dissidents who’ve told me encryption is the reason they are free, or even alive. Governments often make unlawful demands for data, and while we push back and fight these requests in court, there’s always a risk we’ll lose a case — and if the information isn’t encrypted we’d either have to turn over the data or risk our employees being arrested if we failed to comply. This may seem extreme, but we’ve had a case where one of our employees was actually jailed for not providing access to someone’s private information even though we couldn’t access it since it was encrypted.
At the same time, there are real safety concerns to address before we can implement end-to-end encryption across all of our messaging services. Encryption is a powerful tool for privacy, but that includes the privacy of people doing bad things. When billions of people use a service to connect, some of them are going to misuse it for truly terrible things like child exploitation, terrorism, and extortion. We have a responsibility to work with law enforcement and to help prevent these wherever we can. We are working to improve our ability to identify and stop bad actors across our apps by detecting patterns of activity or through other means, even when we can’t see the content of the messages, and we will continue to invest in this work. But we face an inherent tradeoff because we will never find all of the potential harm we do today when our security systems can see the messages themselves.
Finding the right ways to protect both privacy and safety is something societies have historically grappled with. There are still many open questions here and we’ll consult with safety experts, law enforcement and governments on the best ways to implement safety measures. We’ll also need to work together with other platforms to make sure that as an industry we get this right. The more we can create a common approach, the better.
On balance, I believe working towards implementing end-to-end encryption for all private communications is the right thing to do. Messages and calls are some of the most sensitive private conversations people have, and in a world of increasing cyber security threats and heavy-handed government intervention in many countries, people want us to take the extra step to secure their most private data. That seems right to me, as long as we take the time to build the appropriate safety systems that stop bad actors as much as we possibly can within the limits of an encrypted service. We’ve started working on these safety systems building on the work we’ve done in WhatsApp, and we’ll discuss them with experts through 2019 and beyond before fully implementing end-to-end encryption. As we learn more from those experts, we’ll finalize how to roll out these systems.
Reducing Permanence
We increasingly believe it’s important to keep information around for shorter periods of time. People want to know that what they share won’t come back to hurt them later, and reducing the length of time their information is stored and accessible will help.
One challenge in building social tools is the “permanence problem”. As we build up large collections of messages and photos over time, they can become a liability as well as an asset. For example, many people who have been on Facebook for a long time have photos from when they were younger that could be embarrassing. But people also really love keeping a record of their lives. And if all posts on Facebook and Instagram disappeared, people would lose access to a lot of valuable knowledge and experiences others have shared.
I believe there’s an opportunity to set a new standard for private communication platforms — where content automatically expires or is archived over time. Stories already expire after 24 hours unless you archive them, and that gives people the comfort to share more naturally. This philosophy could be extended to all private content.
For example, messages could be deleted after a month or a year by default. This would reduce the risk of your messages resurfacing and embarrassing you later. Of course you’d have the ability to change the timeframe or turn off auto-deletion for your threads if you wanted. And we could also provide an option for you to set individual messages to expire after a few seconds or minutes if you wanted.
It also makes sense to limit the amount of time we store messaging metadata. We use this data to run our spam and safety systems, but we don’t always need to keep it around for a long time. An important part of the solution is to collect less personal data in the first place, which is the way WhatsApp was built from the outset.
Interoperability
People want to be able to choose which service they use to communicate with people. However, today if you want to message people on Facebook you have to use Messenger, on Instagram you have to use Direct, and on WhatsApp you have to use WhatsApp. We want to give people a choice so they can reach their friends across these networks from whichever app they prefer.
We plan to start by making it possible for you to send messages to your contacts using any of our services, and then to extend that interoperability to SMS too. Of course, this would be opt-in and you will be able to keep your accounts separate if you’d like.
There are privacy and security advantages to interoperability. For example, many people use Messenger on Android to send and receive SMS texts. Those texts can’t be end-to-end encrypted because the SMS protocol is not encrypted. With the ability to message across our services, however, you’d be able to send an encrypted message to someone’s phone number in WhatsApp from Messenger.
This could also improve convenience in many experiences where people use Facebook or Instagram as their social network and WhatsApp as their preferred messaging service. For example, lots of people selling items on Marketplace list their phone number so people can message them about buying it. That’s not ideal, because you’re giving strangers your phone number. With interoperability, you’d be able to use WhatsApp to receive messages sent to your Facebook account without sharing your phone number — and the buyer wouldn’t have to worry about whether you prefer to be messaged on one network or the other.
You can imagine many simple experiences — a person discovers a business on Instagram and easily transitions to their preferred messaging app for secure payments and customer support; another person wants to catch up with a friend and can send them a message that goes to their preferred app without having to think about where that person prefers to be reached; or you simply post a story from your day across both Facebook and Instagram and can get all the replies from your friends in one place.
You can already send and receive SMS texts through Messenger on Android today, and we’d like to extend this further in the future, perhaps including the new telecom RCS standard. However, there are several issues we’ll need to work through before this will be possible. First, Apple doesn’t allow apps to interoperate with SMS on their devices, so we’d only be able to do this on Android. Second, we’d need to make sure interoperability doesn’t compromise the expectation of encryption that people already have using WhatsApp. Finally, it would create safety and spam vulnerabilities in an encrypted system to let people send messages from unknown apps where our safety and security systems couldn’t see the patterns of activity.
These are significant challenges and there are many questions here that require further consultation and discussion. But if we can implement this, we can give people more choice to use their preferred service to securely reach the people they want.
Secure Data Storage
People want to know their data is stored securely in places they trust. Looking at the future of the internet and privacy, I believe one of the most important decisions we’ll make is where we’ll build data centers and store people’s sensitive data.
There’s an important difference between providing a service in a country and storing people’s data there. As we build our infrastructure around the world, we’ve chosen not to build data centers in countries that have a track record of violating human rights like privacy or freedom of expression. If we build data centers and store sensitive data in these countries, rather than just caching non-sensitive data, it could make it easier for those governments to take people’s information.
Upholding this principle may mean that our services will get blocked in some countries, or that we won’t be able to enter others anytime soon. That’s a tradeoff we’re willing to make. We do not believe storing people’s data in some countries is a secure enough foundation to build such important internet infrastructure on.
Of course, the best way to protect the most sensitive data is not to store it at all, which is why WhatsApp doesn’t store any encryption keys and we plan to do the same with our other services going forward.
But storing data in more countries also establishes a precedent that emboldens other governments to seek greater access to their citizen’s data and therefore weakens privacy and security protections for people around the world. I think it’s important for the future of the internet and privacy that our industry continues to hold firm against storing people’s data in places where it won’t be secure.
Next Steps
Over the next year and beyond, there are a lot more details and tradeoffs to work through related to each of these principles. A lot of this work is in the early stages, and we are committed to consulting with experts, advocates, industry partners, and governments — including law enforcement and regulators — around the world to get these decisions right.
At the same time, working through these principles is only the first step in building out a privacy-focused social platform. Beyond that, significant thought needs to go into all of the services we build on top of that foundation — from how people do payments and financial transactions, to the role of businesses and advertising, to how we can offer a platform for other private services.
But these initial questions are critical to get right. If we do this well, we can create platforms for private sharing that could be even more important to people than the platforms we’ve already built to help people share and connect more openly.
Doing this means taking positions on some of the most important issues facing the future of the internet. As a society, we have an opportunity to set out where we stand, to decide how we value private communications, and who gets to decide how long and where data should be stored.
I believe we should be working towards a world where people can speak privately and live freely knowing that their information will only be seen by who they want to see it and won’t all stick around forever. If we can help move the world in this direction, I will be proud of the difference we’ve made.
source https://techcrunch.com/2019/03/06/facebook-living-room/
0 notes
Text
Zuckerberg wants messages to auto-expire to make Facebook a “living room”
On feed-based “broader social networks, where people can accumulate friends or followers until the services feel more public . . . it feels more like a town square than a more intimate space like a living room” Facebook CEO Mark Zuckerberg explained in a blog post today. With messaging, groups, and ephemeral stories as the fastest growing social features, Zuckerberg laid out why he’s rethinking Facebook as private living room where people can be comfortable being themselves without fear of hackers, government spying, and embarassment from old content without encryption allowing bad actors to hide their crimes.
Perhaps this will just be more lip service in a time of PR crisis for Facebook. But with the business imperative fueled by social networking’s shift away from permanent feed broadcasting, Facebook can espouse the philosophy of privacy while in reality servicing its shareholders and bottom line. It’s this alignment that actually spurs product change. We saw Facebook’s agility with last year’s realization that a misinformation- and hate-plagued platform wouldn’t survive long-term so Facebook had to triple its security and moderation staff. And in 2017, recognizing the threat of Stories, it implemented them across its apps. Now Facebook might finally see the dollar signs within privacy.
The New York Times’ Mike Isaac recently reported that Facebook planned to unify its Facebook, WhatsApp, and Instagram messaging infrastructure to allow cross-app messaging and end-to-end encryption. And Zuckerberg discussed this and the value of ephemerality on the recent earnings call. But now he’s roadmapped a clearer slate of changes and policies to turn Facebook into a living room:
-Facebook will let users opt in to the ability to send or receive messages across Facebook, WhatsApp, and Instagram
-Facebook wants to expand that interoperability to SMS on Android
-Zuckerberg wants to make ephemerality automatic on messaging threads, so chats disappear by default after a month or year, with users able to control that or put timers on individual messages.
-Facebook will extend end-to-end encryption across its messaging apps but use metadata and other non-content signals to weed out criminals using privacy to hide their misdeeds.
-Facebook won’t store data in countries with a bad track record of privacy abuse
You can read the full blog post from Zuckerberg below:
Posted by Mark Zuckerberg on Wednesday, March 6, 2019
A Privacy-Focused Vision for Social Networking
My focus for the last couple of years has been understanding and addressing the biggest challenges facing Facebook. This means taking positions on important issues concerning the future of the internet. In this note, I’ll outline our vision and principles around building a privacy-focused messaging and social networking platform. There’s a lot to do here, and we’re committed to working openly and consulting with experts across society as we develop this.
—
Over the last 15 years, Facebook and Instagram have helped people connect with friends, communities, and interests in the digital equivalent of a town square. But people increasingly also want to connect privately in the digital equivalent of the living room. As I think about the future of the internet, I believe a privacy-focused communications platform will become even more important than today’s open platforms. Privacy gives people the freedom to be themselves and connect more naturally, which is why we build social networks.
Today we already see that private messaging, ephemeral stories, and small groups are by far the fastest growing areas of online communication. There are a number of reasons for this. Many people prefer the intimacy of communicating one-on-one or with just a few friends. People are more cautious of having a permanent record of what they’ve shared. And we all expect to be able to do things like payments privately and securely.
Public social networks will continue to be very important in people’s lives — for connecting with everyone you know, discovering new people, ideas and content, and giving people a voice more broadly. People find these valuable every day, and there are still a lot of useful services to build on top of them. But now, with all the ways people also want to interact privately, there’s also an opportunity to build a simpler platform that’s focused on privacy first.
I understand that many people don’t think Facebook can or would even want to build this kind of privacy-focused platform — because frankly we don’t currently have a strong reputation for building privacy protective services, and we’ve historically focused on tools for more open sharing. But we’ve repeatedly shown that we can evolve to build the services that people really want, including in private messaging and stories.
I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won’t stick around forever. This is the future I hope we will help bring about.
We plan to build this the way we’ve developed WhatsApp: focus on the most fundamental and private use case — messaging — make it as secure as possible, and then build more ways for people to interact on top of that, including calls, video chats, groups, stories, businesses, payments, commerce, and ultimately a platform for many other kinds of private services.
This privacy-focused platform will be built around several principles:
Private interactions. People should have simple, intimate places where they have clear control over who can communicate with them and confidence that no one else can access what they share.
Encryption. People’s private communications should be secure. End-to-end encryption prevents anyone — including us — from seeing what people share on our services.
Permanence. People should be comfortable being themselves, and should not have to worry about what they share coming back to hurt them later. So we won’t keep messages or stories around for longer than necessary to deliver the service or longer than people want it.
Safety. People should expect that we will do everything we can to keep them safe on our services within the limits of what’s possible in an encrypted service.
Interoperability. People should be able to use any of our apps to reach their friends, and they should be able to communicate across networks easily and securely.
Secure data storage. People should expect that we won’t store sensitive data in countries with weak records on human rights like privacy and freedom of expression in order to protect data from being improperly accessed.
Over the next few years, we plan to rebuild more of our services around these ideas. The decisions we’ll face along the way will mean taking positions on important issues concerning the future of the internet. We understand there are a lot of tradeoffs to get right, and we’re committed to consulting with experts and discussing the best way forward. This will take some time, but we’re not going to develop this major change in our direction behind closed doors. We’re going to do this as openly and collaboratively as we can because many of these issues affect different parts of society.
Private Interactions as a Foundation
For a service to feel private, there must never be any doubt about who you are communicating with. We’ve worked hard to build privacy into all our products, including those for public sharing. But one great property of messaging services is that even as your contacts list grows, your individual threads and groups remain private. As your friends evolve over time, messaging services evolve gracefully and remain intimate.
This is different from broader social networks, where people can accumulate friends or followers until the services feel more public. This is well-suited to many important uses — telling all your friends about something, using your voice on important topics, finding communities of people with similar interests, following creators and media, buying and selling things, organizing fundraisers, growing businesses, or many other things that benefit from having everyone you know in one place. Still, when you see all these experiences together, it feels more like a town square than a more intimate space like a living room.
There is an opportunity to build a platform that focuses on all of the ways people want to interact privately. This sense of privacy and intimacy is not just about technical features — it is designed deeply into the feel of the service overall. In WhatsApp, for example, our team is obsessed with creating an intimate environment in every aspect of the product. Even where we’ve built features that allow for broader sharing, it’s still a less public experience. When the team built groups, they put in a size limit to make sure every interaction felt private. When we shipped stories on WhatsApp, we limited public content because we worried it might erode the feeling of privacy to see lots of public content — even if it didn’t actually change who you’re sharing with.
In a few years, I expect future versions of Messenger and WhatsApp to become the main ways people communicate on the Facebook network. We’re focused on making both of these apps faster, simpler, more private and more secure, including with end-to-end encryption. We then plan to add more ways to interact privately with your friends, groups, and businesses. If this evolution is successful, interacting with your friends and family across the Facebook network will become a fundamentally more private experience.
Encryption and Safety
People expect their private communications to be secure and to only be seen by the people they’ve sent them to — not hackers, criminals, over-reaching governments, or even the people operating the services they’re using.
There is a growing awareness that the more entities that have access to your data, the more vulnerabilities there are for someone to misuse it or for a cyber attack to expose it. There is also a growing concern among some that technology may be centralizing power in the hands of governments and companies like ours. And some people worry that our services could access their messages and use them for advertising or in other ways they don’t expect.
End-to-end encryption is an important tool in developing a privacy-focused social network. Encryption is decentralizing — it limits services like ours from seeing the content flowing through them and makes it much harder for anyone else to access your information. This is why encryption is an increasingly important part of our online lives, from banking to healthcare services. It’s also why we built end-to-end encryption into WhatsApp after we acquired it.
In the last year, I’ve spoken with dissidents who’ve told me encryption is the reason they are free, or even alive. Governments often make unlawful demands for data, and while we push back and fight these requests in court, there’s always a risk we’ll lose a case — and if the information isn’t encrypted we’d either have to turn over the data or risk our employees being arrested if we failed to comply. This may seem extreme, but we’ve had a case where one of our employees was actually jailed for not providing access to someone’s private information even though we couldn’t access it since it was encrypted.
At the same time, there are real safety concerns to address before we can implement end-to-end encryption across all of our messaging services. Encryption is a powerful tool for privacy, but that includes the privacy of people doing bad things. When billions of people use a service to connect, some of them are going to misuse it for truly terrible things like child exploitation, terrorism, and extortion. We have a responsibility to work with law enforcement and to help prevent these wherever we can. We are working to improve our ability to identify and stop bad actors across our apps by detecting patterns of activity or through other means, even when we can’t see the content of the messages, and we will continue to invest in this work. But we face an inherent tradeoff because we will never find all of the potential harm we do today when our security systems can see the messages themselves.
Finding the right ways to protect both privacy and safety is something societies have historically grappled with. There are still many open questions here and we’ll consult with safety experts, law enforcement and governments on the best ways to implement safety measures. We’ll also need to work together with other platforms to make sure that as an industry we get this right. The more we can create a common approach, the better.
On balance, I believe working towards implementing end-to-end encryption for all private communications is the right thing to do. Messages and calls are some of the most sensitive private conversations people have, and in a world of increasing cyber security threats and heavy-handed government intervention in many countries, people want us to take the extra step to secure their most private data. That seems right to me, as long as we take the time to build the appropriate safety systems that stop bad actors as much as we possibly can within the limits of an encrypted service. We’ve started working on these safety systems building on the work we’ve done in WhatsApp, and we’ll discuss them with experts through 2019 and beyond before fully implementing end-to-end encryption. As we learn more from those experts, we’ll finalize how to roll out these systems.
Reducing Permanence
We increasingly believe it’s important to keep information around for shorter periods of time. People want to know that what they share won’t come back to hurt them later, and reducing the length of time their information is stored and accessible will help.
One challenge in building social tools is the “permanence problem”. As we build up large collections of messages and photos over time, they can become a liability as well as an asset. For example, many people who have been on Facebook for a long time have photos from when they were younger that could be embarrassing. But people also really love keeping a record of their lives. And if all posts on Facebook and Instagram disappeared, people would lose access to a lot of valuable knowledge and experiences others have shared.
I believe there’s an opportunity to set a new standard for private communication platforms — where content automatically expires or is archived over time. Stories already expire after 24 hours unless you archive them, and that gives people the comfort to share more naturally. This philosophy could be extended to all private content.
For example, messages could be deleted after a month or a year by default. This would reduce the risk of your messages resurfacing and embarrassing you later. Of course you’d have the ability to change the timeframe or turn off auto-deletion for your threads if you wanted. And we could also provide an option for you to set individual messages to expire after a few seconds or minutes if you wanted.
It also makes sense to limit the amount of time we store messaging metadata. We use this data to run our spam and safety systems, but we don’t always need to keep it around for a long time. An important part of the solution is to collect less personal data in the first place, which is the way WhatsApp was built from the outset.
Interoperability
People want to be able to choose which service they use to communicate with people. However, today if you want to message people on Facebook you have to use Messenger, on Instagram you have to use Direct, and on WhatsApp you have to use WhatsApp. We want to give people a choice so they can reach their friends across these networks from whichever app they prefer.
We plan to start by making it possible for you to send messages to your contacts using any of our services, and then to extend that interoperability to SMS too. Of course, this would be opt-in and you will be able to keep your accounts separate if you’d like.
There are privacy and security advantages to interoperability. For example, many people use Messenger on Android to send and receive SMS texts. Those texts can’t be end-to-end encrypted because the SMS protocol is not encrypted. With the ability to message across our services, however, you’d be able to send an encrypted message to someone’s phone number in WhatsApp from Messenger.
This could also improve convenience in many experiences where people use Facebook or Instagram as their social network and WhatsApp as their preferred messaging service. For example, lots of people selling items on Marketplace list their phone number so people can message them about buying it. That’s not ideal, because you’re giving strangers your phone number. With interoperability, you’d be able to use WhatsApp to receive messages sent to your Facebook account without sharing your phone number — and the buyer wouldn’t have to worry about whether you prefer to be messaged on one network or the other.
You can imagine many simple experiences — a person discovers a business on Instagram and easily transitions to their preferred messaging app for secure payments and customer support; another person wants to catch up with a friend and can send them a message that goes to their preferred app without having to think about where that person prefers to be reached; or you simply post a story from your day across both Facebook and Instagram and can get all the replies from your friends in one place.
You can already send and receive SMS texts through Messenger on Android today, and we’d like to extend this further in the future, perhaps including the new telecom RCS standard. However, there are several issues we’ll need to work through before this will be possible. First, Apple doesn’t allow apps to interoperate with SMS on their devices, so we’d only be able to do this on Android. Second, we’d need to make sure interoperability doesn’t compromise the expectation of encryption that people already have using WhatsApp. Finally, it would create safety and spam vulnerabilities in an encrypted system to let people send messages from unknown apps where our safety and security systems couldn’t see the patterns of activity.
These are significant challenges and there are many questions here that require further consultation and discussion. But if we can implement this, we can give people more choice to use their preferred service to securely reach the people they want.
Secure Data Storage
People want to know their data is stored securely in places they trust. Looking at the future of the internet and privacy, I believe one of the most important decisions we’ll make is where we’ll build data centers and store people’s sensitive data.
There’s an important difference between providing a service in a country and storing people’s data there. As we build our infrastructure around the world, we’ve chosen not to build data centers in countries that have a track record of violating human rights like privacy or freedom of expression. If we build data centers and store sensitive data in these countries, rather than just caching non-sensitive data, it could make it easier for those governments to take people’s information.
Upholding this principle may mean that our services will get blocked in some countries, or that we won’t be able to enter others anytime soon. That’s a tradeoff we’re willing to make. We do not believe storing people’s data in some countries is a secure enough foundation to build such important internet infrastructure on.
Of course, the best way to protect the most sensitive data is not to store it at all, which is why WhatsApp doesn’t store any encryption keys and we plan to do the same with our other services going forward.
But storing data in more countries also establishes a precedent that emboldens other governments to seek greater access to their citizen’s data and therefore weakens privacy and security protections for people around the world. I think it’s important for the future of the internet and privacy that our industry continues to hold firm against storing people’s data in places where it won’t be secure.
Next Steps
Over the next year and beyond, there are a lot more details and tradeoffs to work through related to each of these principles. A lot of this work is in the early stages, and we are committed to consulting with experts, advocates, industry partners, and governments — including law enforcement and regulators — around the world to get these decisions right.
At the same time, working through these principles is only the first step in building out a privacy-focused social platform. Beyond that, significant thought needs to go into all of the services we build on top of that foundation — from how people do payments and financial transactions, to the role of businesses and advertising, to how we can offer a platform for other private services.
But these initial questions are critical to get right. If we do this well, we can create platforms for private sharing that could be even more important to people than the platforms we’ve already built to help people share and connect more openly.
Doing this means taking positions on some of the most important issues facing the future of the internet. As a society, we have an opportunity to set out where we stand, to decide how we value private communications, and who gets to decide how long and where data should be stored.
I believe we should be working towards a world where people can speak privately and live freely knowing that their information will only be seen by who they want to see it and won’t all stick around forever. If we can help move the world in this direction, I will be proud of the difference we’ve made.
Via Josh Constine https://techcrunch.com
0 notes
Photo

Spy Detection for Android Devices
By Naren M S | Nishita K Murthy | Deepthi S Kumar | Soumya K N"Spy Detection for Android Devices"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018,
URL: http://www.ijtsrd.com/papers/ijtsrd14202.pdf
http://www.ijtsrd.com/computer-science/computer-security/14202/spy-detection-for-android-devices/naren-m-s
manuscript publication, call for paper papers in journals, science journal
This paper proposes a procedure to enhance anti- theft to prevent robbery for android-based smartphones by utilizing SMS as a medium. As the usage of phones, tablets, note pads are designed with the help of android OS is drastically rising and expanding, numerous situations related with anti- theft have additionally been evolved, however the greater part of the software products are not readily available and it is hard to recognize the robber by utilizing these software products like GPS Tracking. We have set forward another plan, which improves the current situation, in view of new advancements like messages being sent and received. The situation proposed in this work is absolutely reliant on the hardware of the cell phone like camera (front) and GPS tracker. When this application is installed on the phone, it will work in the background without displaying the application to the thief, stores the current SIM number in a server and application and continues checking continuously for the change in the SIM. Once the SIM card allotted on the device changes, it will capture 3 pictures and the GPS co- ordinates (latitude and longitude) are obtained. The details are acquired without taking the permission from the user. The pictures and GPS co-ordinates are stored in the server and an SMS is sent to an alternate number which was given during login. The major benefit of this product is that it is very simple to configure, it continues running as a background application without the thief's notice and without interfering with the user. It assists the owner to identify the criminal on his own.
0 notes