
Iran asks its people to delete WhatsApp from their devices
Iranian state television on July 17 urged people to remove WhatsApp from their smartphones, alleging without specific evidence that the messaging app gathered user information to send to Israel. — Pixabay
Iranian state television on July 17 urged people to remove WhatsApp from their smartphones, alleging without specific evidence that the messaging app gathered user information to send to Israel.
In a statement, WhatsApp said it was "concerned these false reports will be an excuse for our services to be blocked at a time when people need them the most'. WhatsApp uses end-to-end encryption, meaning a service provider in the middle can't read a message.
"We do not track your precise location, we don't keep logs of who everyone is messaging and we do not track the personal messages people are sending one another," it added. "We do not provide bulk information to any government.'
End-to-end encryption means that messages are scrambled so that only the sender and recipient can see them. If anyone else intercepts the message, all they will see is a garble that can't be unscrambled without the key.
Gregory Falco, an assistant professor of engineering at Cornell University and cybersecurity expert, said it's been demonstrated that it's possible to understand metadata about WhatsApp that does not get encrypted.
"So you can understand things about how people are using the app and that's been a consistent issue where people have not been interested in engaging with WhatsApp for that (reason),' he said.
Another issue is data sovereignty, Falco added, where data centers hosting WhatsApp data from a certain country are not necessarily located in that country. It's more than feasible, for instance, that WhatsApp's data from Iran is not hosted in Iran.
"Countries need to house their data in-country and process the data in-country with their own algorithms. Because it's really hard increasingly to trust the global network of data infrastructure,' he said.
WhatsApp is owned by Meta Platforms, the parent company of Facebook and Instagram.
Iran has blocked access to various social media platforms over the years but many people in the country use proxies and virtual private networks, or VPNs, to access them. It banned WhatsApp and Google Play in 2022 during mass protests against the government over the death of a woman held by the country's morality police. That ban was lifted late last year.
WhatsApp had been one of Iran's most popular messaging apps besides Instagram and Telegram. – AP

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
![[FACTBOX] US B-2 bombers, bunker-busters and alternatives](/_next/image?url=https%3A%2F%2Fassets.nst.com.my%2Fimages%2Farticles%2Fdfbbbre_1750567235.jpg&w=3840&q=100)
![[FACTBOX] US B-2 bombers, bunker-busters and alternatives](/_next/image?url=https%3A%2F%2Fassets.nst.com.my%2Fassets%2FNST-Logo%402x.png%3Fid%3Db37a17055cb1ffea01f5&w=48&q=75)
New Straits Times
20 hours ago
- New Straits Times
[FACTBOX] US B-2 bombers, bunker-busters and alternatives
WASHINGTON: The US Air Force's B-2 Spirit stealth bombers were involved in strikes on Iran's nuclear sites on Saturday. Three Iranian nuclear sites were struck in a "very successful attack," President Donald Trump said on Saturday, adding that the crown jewel of Tehran's nuclear programme, Fordow, is gone. The B-2 is one of America's most advanced strategic weapons platforms, capable of entering sophisticated air defenses and delivering precision strikes against hardened targets such as Iran's buried network of nuclear research facilities. B-2 SPIRIT SPECIFICATIONS: The US B-2 costs about US$2.1 billion each, making it the most expensive military aircraft ever built. Made by Northrop Grumman, the bomber, with its cutting-edge stealth technology, began its production run in the late 1980s but was curbed by the fall of the Soviet Union. Only 21 were made after the Pentagon's planned acquisition programme was truncated. The bomber's range of over 6,000 nautical miles (11,112km) without refueling enables global strike capabilities from continental US bases. With aerial refueling, the B-2 can reach virtually any target worldwide, as demonstrated in missions from Missouri to Afghanistan and Libya and now Iran. Its payload capacity of more than 40,000 pounds (18,144kg) allows the aircraft to carry a diverse array of conventional and nuclear weapons. The bomber's internal weapons bays are specifically designed to maintain stealth characteristics while accommodating large ordnance loads which could include two GBU-57A/B MOP (Massive Ordnance Penetrator), a 30,000-pound precision-guided "bunker buster" bomb. Reports said six bunker buster bombs were used on Iran's Fordow research site. The B-2's two-pilot crew configuration reduces personnel requirements while maintaining operational effectiveness through advanced automation systems. The B-2's stealth technology incorporates radar-absorbing materials and angular design features that minimise detection by enemy air defense systems. Its radar cross-section is reportedly comparable to that of a small bird, making it nearly invisible to conventional radar. MASSIVE ORDNANCE PENETRATOR (MOP): The 30,000-pound MOP represents the largest conventional bomb in the US arsenal, specifically engineered to defeat hardened underground bunkers. Its massive size requires the B-2 to carry only one or two MOPs per mission, but provides unmatched bunker-penetration capability. The weapon's 20.5-foot (6.25-m) length and GPS-guided precision targeting system enable accurate strikes against specific underground facilities. Its penetration capability of over 200 feet through hardened concrete makes it effective against the world's most protected underground installations. CONVENTIONAL PAYLOADS: Joint Direct Attack Munitions (JDAM) provide the B-2 with precision conventional strike capability against fixed targets. These GPS-guided weapons can be deployed in large numbers, with the bomber capable of simultaneously engaging multiple targets with high accuracy. Joint Standoff Weapons (JSOW) extend the aircraft's engagement range while maintaining stealth characteristics during approach. These glide bombs allow the B-2 to strike targets from outside heavily defended airspace perimeters. Joint Air-to-Surface Standoff Missiles (JASSM) offer long-range precision strike capability with their own stealth features. The extended-range JASSM-ER variant provides strike options against targets over 500 miles (805km) away. The B-2 Spirit serves as a key component of America's nuclear triad, capable of delivering strategic nuclear weapons with stealth and precision. The aircraft can carry up to 16 B83 nuclear bombs.

Barnama
2 days ago
- Barnama
Iran Blocks Major Israeli Cyber Assaults On Banking, Vital Infrastructure Networks
ISTANBUL, June 21 (Bernama-Anadolu) -- Iran's Cyber Security Command announced that since the onset of Israeli cyberattacks amid the conflict, multiple attempts to disrupt critical infrastructure, including the banking network, have been largely thwarted, Anadolu Ajansi (AA) reported, citing Iranian Mehr News Agency on Friday. Key achievements highlighted, according to a statement by the Command, include repelling major distributed denial-of-service attacks, limiting hacker groups' access to sabotage systems and steal data, causing a partial collapse of Israel's command and control (C4I) structures near military operations and disrupting Israeli data collection mechanisms used for targeted attacks. Additionally, efforts prevented the exploitation of mobile phone malware by hostile actors, it added.


New Straits Times
2 days ago
- New Straits Times
Australia ban bid faces new wildcard: Teenagers
WHEN 13-year-old Jasmine Elkin tried out the age-checking software Australia might use to ban children and teenagers from social media, she was surprised some products could identify a person's age to the month — but she still doubts it will work. "People are always going to find a way to get past it," said the Perth schoolgirl who trialled five photo-based age estimation products with about 30 other students last month. "They can get their brother or sister to take a photo. There's nothing really that you can do about it." Elkin's view echoes one of the main concerns of child protection advocates, tech firms and even the trial organisers about the technology Australia hopes will enable the world's first national social media ban for under-16s: the software works, they say, but young people will find a way around it. From December, social media companies like Meta's Facebook and Instagram, Snapchat and TikTok will face a fine of as much as A$49.5 million if they fail to take what the law calls "reasonable steps" to block younger users in an effort to protect their mental and physical health. The platforms say users need to be at least 13 years old to sign up for an account. How well the ban works could reverberate across some of the world's largest companies and the governments seeking to contain them: already Britain, France and Singapore are making efforts to keep children and teens off social media, while American states, including Florida, are challenging free speech laws by pushing for a ban. Even the law's opponents are likely to be watching closely: X owner Elon Musk, who is a vocal opponent of platform moderation and regulation, has criticised the measure and called the regulator overseeing it a "censorship commissar". "Everybody is looking at Australia," said Colm Gannon, chief executive officer of the International Centre for Missing and Exploited Children Australia, a member of the trial's stakeholder adviser group. "Australia should be really focusing on robust technology, robust testing and making sure the scope of the actual project is in line with the needs that they're trying to address." The organisers of the trial, which ended this month, say it was designed to determine whether the software worked as promised, and that nearly 60 products were pitched. But it also underlined the teenagers' tech skills — testers were so fast completing their assignments, organisers doubled the number of products they tested and halved session times as the project progressed. "It hasn't been our intention to pull apart the software, rip the guts out and work out every different way that you could circumvent it," said Andrew Hammond, general manager at tech contractor KJR, which ran the trial. They are expected to deliver a detailed report to the government by the end of next month. That will inform the eSafety Commissioner's advice to the government, which cited risks from cyberbullying, harmful depictions of body image and misogynist content in pushing forward with the legislation. "We know that social media age restrictions will not be the end-all be-all solution for harms experienced by young people online, but it's a step in the right direction to keep our kids safer," said a spokesman for Communications Minister Anika Wells. For some of the young Australians who participated, the trial was a glimpse into a world six months in the future where, according to the law, they will no longer be allowed to use a platform they have come to rely on for daily communication. "I use it a lot, but I can still live without it," said Canberra school student Charlie Price, 14, who trialled four software options in a room with about 60 peers and had his age guessed accurately (someone in his testing group was wrongly assessed at over 20). "I know people that will get really shocked and upset," added Price, who uses Snapchat, Instagram and messaging platform Discord and plans to collect phone numbers of his online associates before December. Like Elkin, he said he thought some teenagers might try to get around the block.