Privacy and Security Are Major Considerations When Choosing Messaging Apps

Privacy and Security Are Major Considerations When Choosing Messaging Apps

While many people seem to have little problem sharing their data with social media platforms, there is definite pushback against sharing the personal data generated by a messaging platform. This can be witnessed in WhatsApp, the cross-platform messaging application whose main selling point has been its end-to-end encryption, and its announcement that its users will soon be forced to share their personal data with Facebook (which acquired WhatsApp in 2014).

Let’s take a few moments to review the social media and messaging landscape as it stands (as of this writing) and how various applications are shifting.

Facebook’s Consolidation and Antitrust Case

On December 9th, 2020, the Federal Trade Commission filed a lawsuit against Facebook, on the grounds that the social network has been engaged in anticompetitive conduct to help continue its monopolistic hold over the social media space. The attorneys general of 46 states, the District of Columbia, and Guam all cooperated with the FTC in an investigation that—according to the suit—concluded that Facebook has been engaged in illegal business activity to acquire potential rivals, like Instagram and WhatsApp, and restrict software developers and their ability to be competitive to help maintain their dominance over the market. In doing so, Facebook is accused of stifling competition for both social media networks and advertisers and restricting the choices available to consumers.

In essence, Facebook is accused of electing to purchase up their rivals, rather than competing with them directly. This complaint alleges that Facebook has recognized the threats posed by these rivals in the past, and by purchasing these platforms and applications, both eliminated rising threats against their standing and made it more difficult for another potential rival to pose a threat.

Furthermore, Facebook has also restricted third-party software developers from accessing Facebook via interconnectivity, unless these developers promised that they would only interface an application with Facebook or wouldn’t add any functions that could potentially compete with Facebook’s.

How Signal and Telegram are Benefitting

Returning to the situation that we opened with, WhatsApp’s recent announcement that data will be shared from the encrypted messaging application to Facebook, many users have elected to abandon the former in favor of other alternatives, namely Signal and Telegram. Both apps have seen an incredible boost in downloads since this announcement was released, Signal seeing 7.5 million new installations in a week—4200 percent more than the week previous. Telegram saw a 91 percent increase, with 9 million new users making it the most downloaded application in the United States.

To clarify, WhatsApp is now requiring permissions to share phone numbers, locations, and contacts’ phone numbers with Facebook and its subsidiaries. The application has also stated that these more lenient privacy policies do not affect messages shared between family or friends, only those messages sent to a business. However, it also must be said that those users who do not agree to these terms will no longer be able to use the app.

This is a strange move—many people use WhatsApp because of the level of privacy it is supposed to offer, but that privacy doesn’t seem to include privacy from Facebook. 

What are your thoughts? Let us know, and if you need help establishing a secure, collaborative internal messaging system for your staff, give us a call at 978-482-2020



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 27 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Cloud Email Software Privacy Microsoft Workplace Tips Network Security Hackers Efficiency Google Business Hardware Data Hosted Solutions Computer Malware IT Services Communication IT Support Internet Small Business Mobile Devices Mobile Device Smartphone Android Cloud Computing Innovation Tech Term Backup Data Recovery Managed IT Services Phishing Users Ransomware Smartphones Saving Money Windows Information VoIP Quick Tips Outsourced IT Cybersecurity Disaster Recovery Upgrade Passwords Miscellaneous Network Social Media Data Backup communications Facebook Windows 10 Microsoft Office Browser Business Continuity Business Management Office 365 Server Managed Service Productivity Internet of Things Managed IT Services Collaboration Windows 10 Data Management Apps COVID-19 Remote Work App Vulnerability Save Money Remote Monitoring Analytics Gadgets Artificial Intelligence Gmail Word Router Money Conferencing WiFi Mobile Office Remote Workers Encryption Infrastructure Chrome Government Managed Service Provider IT Support Display Spam Employer-Employee Relationship Website Information Technology Networking Company Culture Google Drive Paperless Office VPN Access Control Virtual Reality Settings Holiday BYOD Applications Tip of the week Avoiding Downtime Managed Services Wireless Employee-Employer Relationship Risk Management Compliance Antivirus Operating System Office Tips Robot Content Filtering Bandwidth Automation Big Data IT Management Data Security End of Support Business Technology Development Virtual Private Network Apple Unified Threat Management Education Storage Wi-Fi HIPAA Firewall Computers Maintenance BDR Hacker Data storage Document Management YouTube Managed IT Service Customer Relationship Management Scam Outlook Solid State Drive Business Intelligence Computing Identity Theft Bring Your Own Device Break Fix LiFi Vendor Management Social Monitors Training Hosted Solution Humor Chromebook OneNote Hard Disk Drive Regulations Search Laptop Best Practice Data Breach Administration MSP Mouse Windows 7 Augmented Reality The Internet of Things Software as a Service Managing Stress Server Management Going Green Data loss Downtime Touchscreen Remote Computing Cybercrime Managed IT Marketing Vendor Telephone Systems How To SaaS desktop Tablet Printing Password IT iOS Social Network Virtualization Mobile Security Retail Alert Two-factor Authentication Voice over Internet Protocol Patch Management Procedure Scalability File Sharing Politics Cooperation Service Level Agreement User Error Distribution Virus Computer Care IBM Work/Life Balance Utility Computing Scary Stories Hotspot Internet Exlporer Alt Codes Gig Economy Customer Service Updates Specifications Office Device Samsung Reducing Cost Running Cable Connectivity Reviews Health Mixed Reality Private Cloud IT Technicians Optimization Heating/Cooling Multi-Factor Security Payment Card Modem FinTech Budget PCI DSS Migration Tech Support Consulting Buisness Staff Leominster Time Management Printer Logistics LED Threats Corporate Profile Laptops Automobile Sports Language Value Typing FBI PowerPoint G Suite Virtual Desktop Black Friday Social Engineering Mobility Batteries IoT Emergency Remote Dell Mirgation Recycling Servers Google Calendar Current Events Inventory Cookies Dark Web Battery Websites Cabling K-12 Schools Network Management Asset Management Co-Managed IT Twitter WannaCry Cyber Monday Peripheral Managed Services Provider Google Maps Computing Infrastructure Professional Services Cryptocurrency K-12 Education Onboarding GDPR Social Networking Safety Print Toner Myths Star Wars Google Docs user treats Slack Hard Disk Drives Chatbots eWaste Legislation IT solutions Shadow IT Nanotechnology Microsoft Excel Files Messaging Wearable Technology Network upgrade SharePoint Hacks Memes Content Huawei Smart Technology Google Wallet Management Entertainment Alerts USB Techology Bitcoin Instant Messaging Network Congestion Digital Signage Data Warehouse Motherboard Cables Shortcuts Mobile Management Digital Payment Fraud Cost Management Lenovo Business Growth Shopping Monitoring Solid State Drives Identity Continuity Statistics Gamification Processor Digital Screen Reader Charging Mail Merge Blockchain Legal RMM Employee-Employer Relationships Meetings Disaster Smart Office Downloads Writing Streaming Shortcut Distributed Denial of Service Unified Communications Drones Policy Hybrid Cloud Licensing Dongle VoIP Unified Threat Management Windows 8 Troubleshooting Business Analysis Wires Security Cameras Profiles Halloween Assessment Firefox Superfish Employees Dark Data Spying Update National Security Solar Bluetooth Comparison Human Error Memory Spyware Smart Tech Address Permissions Deep Learning Banking Analysis Students Uninterrupted Power Supply Work Mobile Device Management Holidays Mobile Data Images 101 Printers How To Error Recovery Point of Sale Ben McDonald shares Mobile Computing Travel Black Market Law Enforcement Notifications Supercomputer CrashOverride Electronic Medical Records Physical Security Motion Sickness Financial Staffing Upgrades Administrator Gadget Emoji Taxes Crowdsourcing IT Budget Web Server what was your? Personal Information Botnet GPS 3D Printing Cortana IT Consultant Cameras Tracking Machine Learning Processors Unsupported Software Free Resource Cleaning CCTV Regulation Computer Repair Webcam Relocation

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3