ENCRYPTED COMMUNICATION USED to be too complicated for mainstream use, but approachable apps like WhatsApp and Signal have become a no-brainer for digital privacy. With all of their security-minded features, like disappearing messages and identity-confirming safety numbers, secure chat apps can rightfully give you peace of mind. You should absolutely use them. As the adage goes, though, there’s no such thing as perfect security. And feeling invincible could get you in trouble.
End-to-end encryption transforms messages into unintelligible chunks of data as soon as a user presses send. From there, the message isn’t reconstituted into something understandable until it reaches the receiver’s device. Along the way, the message is unreadable, protected from prying eyes. It essentially amounts to a bodyguard who picks you up at your house, rides around with you in your car, and walks you to the door of wherever you’re going. You’re safe during the transport, but your vigilance shouldn’t end there.
“These tools are hugely better than traditional email and things like Slack” for security, says Matthew Green, a cryptographer at Johns Hopkins University. “But encryption isn’t magic. You can easily get it wrong. In particular, if you don’t trust the people you’re talking to, you’re screwed.”
On one level it’s obvious that both you and the person you’re chatting with have access to the encrypted conversation—that’s the whole point. But it’s easy to forget in practice that people you message with could show the chat to someone else, take screenshots, or retain the conversation on their device indefinitely.
Former Trump campaign chair Paul Manafort found this out the hard way recently, when the FBI obtained messages he’d sent over WhatsApp from the people who received them.
‘Encryption isn’t magic. You can easily get it wrong. In particular, if you don’t trust the people you’re talking to, you’re screwed.’
MATTHEW GREEN, JOHNS HOPKINS UNIVERSITY
In another current investigation, the FBI was able to access Signal messages sent by former Senate Intelligence Committee aide James Wolfe, and had at least some information about the encrypted messaging habits of New York Timesreporter Ali Watkins, after the Justice Department seized her communications records as part of a leak investigation. Though it’s unknown how the FBI gained access to these encrypted chats, it wouldn’t necessarily have taken a crypto-breaking backdoor if investigators had device access or records from other chat participants.

You also need to keep track of how many devices you’ve stored your encrypted messages on. If you sync chats between, say, your smartphone and your laptop, or back them up in the cloud, there are potentially more opportunities for the data to be exposed. Some services, like iMessage and WhatsApp, either have cloud backups enabled by default or nudge users toward it to streamline the user experience. Manafort provides a useful illustration once again; investigators accessed his iCloud to access some of the same information informants gave them, as well as to glean new information about his activity. The chats were encrypted in WhatsApp; the backups were not.
“Digital systems strew data all over the place,” Green notes. “And providers may keep metadata like who you talked to and when. Encrypted messaging apps are valuable in that they tend to reduce the number of places where your data can live. However, the data is decrypted when it reaches your phone.”
That’s where operations security comes in, the process of protecting information by looking holistically at all the ways it could be obtained, and defending against each of them. An “opsec fail,” as it’s known, happens when someone’s data leaks because they didn’t think of a method an attacker could use to access it, or they didn’t carry out the procedure that was meant to protect against that particular theft strategy. Relying solely on these encrypted messaging tools without considering how they work, and without adding other, additional protections, leaves some paths exposed.
“Good opsec will save you from bad crypto, but good crypto won’t save you from bad opsec,” says Kenn White, director of the Open Crypto Audit Project, referencing a classic warning from security researcher The Grugq. “It’s easy for people to be confused.”
The stakes are especially high in government, where encrypted chat apps and disappearing message features are increasingly popular among officials. Just last week, sources told CNBC that investigators for special counsel Robert Mueller have been asking witnesses to voluntarily grant access to their encrypted messaging apps, including Dust, Confide, WhatsApp, and Signal. CNBC reported that witnesses have cooperated to avoid being subpoenaed.
Several encrypted messaging apps offer a disappearing message feature to help ensure that neither you nor the person you’re chatting with keeps data around longer than necessary. But even this precaution needs to come with the understanding that the service you’re using could fail to actually delete the messages you mark for erasure from their servers. Signal had a recent problem, first reported by Motherboard, where a fix for one bug inadvertently created another that failed to delete a set of messages users had set to disappear. The app quickly resolved the issue, but the situation serves as a reminder that all systems have flaws.
“Encrypted communication apps are tools, and just like any other tool, they have limited uses,” says Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation.
In fact, simply choosing an encrypted messaging service may cary unknown risks. Some services like Confide and Telegram haven’t allowed an independent auditor to evaluate their cryptography, meaning it’s difficult to know how trustworthy they are, which of their promises they keep, and what user data they actually retain. And iMessage may collect more metadata than you think.
Signal, WIRED’s secure messaging recommendation, is open source, but it also proved its trustworthiness in a 2016 case where the service was subpoenaed. Developer Open Whisper Systems responded to a grand jury subpoena saying it could only produce the time an account was created and the most recent date that a user’s Signal app connected to its servers. The court had asked for significantly more detail like user names, addresses, telephone numbers, and email addresses. Signal had retained none of it.
While end-to-end encryption is a vital privacy protection that can thwart many types of surveillance, you still need to understand the other avenues a government or attacker could take to obtain chat logs. Even when a service works perfectly factors like where messages are stored, who else has received them, and who else has access to devices that contain them play an important role in your security. If you’re using encrypted chat apps as one tool in your privacy and security toolbox, more power to you. If you’re relying on it as a panacea, you’re more at risk than you realize.
source: Wired Magazine.



The Presidential pardon stated that it does not apply to violent offenders and people convicted of series crimes and is only for what it termed as “light crimes”. The Presidential decree stated that the decree is being implemented effective immediately by the Attorney General’s Office.
It started as a whisper few weeks ago and as the case with any new administration, there has been mishaps, some ministers in HE President Muse Bihi’s cabinet have found themselves stumbling from one controversy to another almost immediately following their appointments. While others worked quietly to implement the new President’s agenda.

the new cabinet consisted of mostly of new entrants into the political arena, The President went the traditional route of not appointing opposition party members to his cabinet.
Earlier this month, Al-Shabaab has overrun a major military base used by Puntland’s Maritime Police Force in Bali-Khadar where multiple casualties have been reported. Puntland regional administration officials have accused Somaliland of complicity in terrorism and support for Al-Shabaab without providing any prove to substantiate their assertion.

About the Author:
In an
Somalia’s government has been propped up by AMISOM troops and a cadre of JSOC special operators. Last Friday, an American Special Operations forces soldier was killed and four others were wounded in an attack near the town of Jamaame, a town in southwestern Somalia against fighters for the Islamic extremist group the Shabab, where the Special Forces where building a forward operating base. The Defense Department released the name and the identity of the deceased soldier as Staff Sergeant Alexander Conrad of the 3rd Special Forces Group based out Fort Bragg North Carolina.
The Director General of Somaliland’s Central Mr. Ahmed Arwo held a press briefing today at his Office in Hargeisa and spoke at length about the progress the bank has embarked on to restore the value the Somaliland Shilling and the bank’s efforts to curb inflation.
When asked about the objective the Central Bank hopes to achieve with exchange rate text messages the public has been recently receiving, the Director General stated that the bank collects exchange data from the markets and sets the rate although it is not at a point to enforce exchange rates at the moment, though that time will come, it is simply to give people a good idea of what a fair exchange rate is. He added that the feedback the bank is getting about the exchange rate information has been largely positive.
The Azzurri are soccer royalty. In the hierarchy of the World Cup’s elite, Italy forms a power triumvirate with five-time winner Brazil and four-time winner Germany. Like Germany, Italy also has four World Cup titles. When Italy fell to Sweden in its playoff to get into the 32-team World Cup field, it was a stunning development in international soccer. Italy’s exclusion from this year’s tournament is its first in 60 years. Perhaps this development was coming. After winning the 2006 World Cup, Italy had failed to get out of the group stage of the 2010 and 2014 World Cups.
sports fans were wondering about the first-place Boston Red Sox’s World Series chances and if the Chicago Bears — one of the most dominant Super Bowl winners ever — could repeat. Soccer was a sport lost in the wilderness in the USA. Fast forward 32 years, and the soccer culture in the U.S. is totally different. 
The leader of the Somalia’s Puntland regional administration has appointed a governor for one of Somaliland’s eastern most region – Sool.
The Chronicle has reached out to officials from Somaliland government for comment on this development and while most have thought of it as satirical, one who spoke on condition of anonymity stated that “the appointment is not worth the paper it is written on”.