際際滷

際際滷Share a Scribd company logo
PARUL UNIVERSITY
Create by ::
Umang Talpara(170303105342)
Parth Thummar(170303105352)
Pramay Thumar(170303105350)
Class: Cse 6B1(IS)
THE MOST SECURE MESSAGING APP
 All around the world, users turn to
Viber to have open and authentic
conversations with their friends,
family and colleagues. With Viber
you can rest assured, knowing
that your personal chats are
always protected and private and
that all your conversations are
your own. Our mission is to
protect that privacy so you never
have to think twice about what
you can or cant share when
youre using Viber.
WE DONT READ OR LISTEN TO ANY OF YOUR
CHATS AND CALLS
 Unlike other messaging apps, Viber
cant read your personal chats (including
one-on-one chats and group chats) or
listen in on your audio or video calls. We
cant access your messages since we
use end-to-end encryption by default.
You dont have to go out of your way to
turn it on. This means that your private
and group communications are
completely encrypted so that only you
and the people youre talking to can
read or hear them.
WE CANT AND DONT SELL YOUR CONTENT
 When your chats are protected by end-to-end
encryption, no one can access them. Perhaps most
importantly, Viber doesnt have access to themwhich
means nothing you share can be used to target you with
ads later. Other messaging apps will not fully encrypt
your chats automatically for you unless you actively turn
on the encryption mode. This means that some of these
apps can access, read and sell your private
conversations to other 3rd parties or advertisers. Vibers
policy guarantees that we cant sell your private
information since we chose to have no access to your
private chats and calls in the first place. So, you can be
sure you wont mysteriously see ads related to
something you were just talking about with a friend on
Viber.
MORE THAN ENCRYPTION
 Not only are your communications protected by
end-to-end encryption by default, nothing you
share is ever stored on Vibers servers once
delivered. In fact, the messages you send make
their way from your device to the recipients as an
encrypted code. If the recipients phone is off or
they dont have an internet connection, for
example, your message will wait patiently on
Vibers servers for a limited timestill safe and
encrypteduntil their device is prepared to receive
and decrypt it.
100% privacy you can trust::
Thanks to end-to-end encryption, any type of
information you share will always remain between
yourself and the person youre talking to. This means
you never have to think twice about what you can or
cant share when youre using Viber.
IN-TRANSIT ENCRYPTION
 For extra protection, everything Viber
sends from your device to the server
on its way to your recipients device
is encrypted as it travels across the
internet.
END-TO-END ENCRYPTION
BY DEFAULT
 Messages you send make their way from
your device to the recipients in the form
of an encrypted code that only their
device can translate to plain text using an
encryption key. Encryption keys exist only
on user devices and nowhere else. So,
no one  not even Viber  can read
your messages.
TRUST YOUR CONTACTS
 Verify the identity of the person youre
communicating with. In your chat info screen,
authenticate and confirm that the person youre
chatting with is who they say they are. This
provides you with an extra level of security
protection if anything changes with your contact.
An added sense of privacy::
While Vibers end-to-end encryption by default
gives users peace of mind, sometimes we need even
more privacy. These privacy features enable users to
share extra-sensitive information.
HIDDEN CHATS
 Planning a surprise party and dont want
anyone to accidentally see your
conversation? Hide conversations from
your main chat list and access them
whenever you need to with a PIN.
SELF-DESTRUCTING CHATS
 Secret Chats lets you set a self-destruct timer
for every message in your conversation so that
after your message is read, it is automatically
deleted from the Viber chat.
STAY UNDER THE RADAR
 Control when others can see your online
status and the delivery status of the
messages they send you.
THE MOST SECURE MESSAGING APP (information security)

More Related Content

Similar to THE MOST SECURE MESSAGING APP (information security) (6)

Non-Transferable Signatures with PGP
Non-Transferable Signatures with PGPNon-Transferable Signatures with PGP
Non-Transferable Signatures with PGP
blogzilla
Telegram app
Telegram appTelegram app
Telegram app
anandshukla99
Features and difference between telegram and whatsapp
Features  and difference between telegram and whatsappFeatures  and difference between telegram and whatsapp
Features and difference between telegram and whatsapp
nalinsanjeewa340
Why Use A VPN
Why Use A VPNWhy Use A VPN
Why Use A VPN
ReviewsDir
KalamTime Voice Video Solution Presentation.pptx
KalamTime Voice Video Solution Presentation.pptxKalamTime Voice Video Solution Presentation.pptx
KalamTime Voice Video Solution Presentation.pptx
SalmanIqbal45
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
Amritansh Barnwal
Non-Transferable Signatures with PGP
Non-Transferable Signatures with PGPNon-Transferable Signatures with PGP
Non-Transferable Signatures with PGP
blogzilla
Features and difference between telegram and whatsapp
Features  and difference between telegram and whatsappFeatures  and difference between telegram and whatsapp
Features and difference between telegram and whatsapp
nalinsanjeewa340
Why Use A VPN
Why Use A VPNWhy Use A VPN
Why Use A VPN
ReviewsDir
KalamTime Voice Video Solution Presentation.pptx
KalamTime Voice Video Solution Presentation.pptxKalamTime Voice Video Solution Presentation.pptx
KalamTime Voice Video Solution Presentation.pptx
SalmanIqbal45

More from umang talpara (6)

Disaster management Emergency operation center
Disaster management Emergency operation centerDisaster management Emergency operation center
Disaster management Emergency operation center
umang talpara
Bhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talparaBhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talpara
umang talpara
EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)
umang talpara
Daily milk Management
Daily milk ManagementDaily milk Management
Daily milk Management
umang talpara
Online test (java)
Online test (java)Online test (java)
Online test (java)
umang talpara
Disaster management cycle
Disaster management cycleDisaster management cycle
Disaster management cycle
umang talpara
Disaster management Emergency operation center
Disaster management Emergency operation centerDisaster management Emergency operation center
Disaster management Emergency operation center
umang talpara
Bhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talparaBhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talpara
umang talpara
EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)
umang talpara
Daily milk Management
Daily milk ManagementDaily milk Management
Daily milk Management
umang talpara
Online test (java)
Online test (java)Online test (java)
Online test (java)
umang talpara
Disaster management cycle
Disaster management cycleDisaster management cycle
Disaster management cycle
umang talpara

Recently uploaded (20)

module-4.1-Class notes_R and DD_basket-IV -.pdf
module-4.1-Class notes_R and DD_basket-IV -.pdfmodule-4.1-Class notes_R and DD_basket-IV -.pdf
module-4.1-Class notes_R and DD_basket-IV -.pdf
ritikkumarchaudhury7
RES REVIEW 21qqqqqqqqqqqqqqqq1sbsjsnskdndndksns
RES REVIEW 21qqqqqqqqqqqqqqqq1sbsjsnskdndndksnsRES REVIEW 21qqqqqqqqqqqqqqqq1sbsjsnskdndndksns
RES REVIEW 21qqqqqqqqqqqqqqqq1sbsjsnskdndndksns
lakshmirajanna1983
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptxUnit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Kirankumar Jagtap
Using 3D CAD in FIRST Tech Challenge - Fusion 360
Using 3D CAD in FIRST Tech Challenge - Fusion 360Using 3D CAD in FIRST Tech Challenge - Fusion 360
Using 3D CAD in FIRST Tech Challenge - Fusion 360
FTC Team 23014
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptxBrown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
shafieqadwasyazanee
FIRST Tech Challenge/Robotics: Scouting out the competition
FIRST Tech Challenge/Robotics: Scouting out the competitionFIRST Tech Challenge/Robotics: Scouting out the competition
FIRST Tech Challenge/Robotics: Scouting out the competition
FTC Team 23014
Artificial intelligence and Machine learning in remote sensing and GIS
Artificial intelligence  and Machine learning in remote sensing and GISArtificial intelligence  and Machine learning in remote sensing and GIS
Artificial intelligence and Machine learning in remote sensing and GIS
amirthamm2083
wind energy types of turbines and advantages
wind energy types of turbines and advantageswind energy types of turbines and advantages
wind energy types of turbines and advantages
MahmudHalef
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
ssuserb91a20
PLANT CELL REACTORS presenation PTC amity
PLANT CELL REACTORS presenation PTC amityPLANT CELL REACTORS presenation PTC amity
PLANT CELL REACTORS presenation PTC amity
UrjaMoon
Software security: Security a Software Issue
Software security: Security a Software IssueSoftware security: Security a Software Issue
Software security: Security a Software Issue
Dr Sarika Jadhav
UHV unit-2UNIT - II HARMONY IN THE HUMAN BEING.pptx
UHV unit-2UNIT - II HARMONY IN THE HUMAN BEING.pptxUHV unit-2UNIT - II HARMONY IN THE HUMAN BEING.pptx
UHV unit-2UNIT - II HARMONY IN THE HUMAN BEING.pptx
ariomthermal2031
Introduction to 3D Printing Technology.pptx
Introduction to 3D Printing Technology.pptxIntroduction to 3D Printing Technology.pptx
Introduction to 3D Printing Technology.pptx
pprakash21252
Caddlance PortfolioMixed Projects 2024.pdf
Caddlance PortfolioMixed Projects 2024.pdfCaddlance PortfolioMixed Projects 2024.pdf
Caddlance PortfolioMixed Projects 2024.pdf
sonam254547
Production Planning & Control and Inventory Management.pptx
Production Planning & Control and Inventory Management.pptxProduction Planning & Control and Inventory Management.pptx
Production Planning & Control and Inventory Management.pptx
VirajPasare
Distributed renewable energy in Colombia.OECD2023.pdf
Distributed renewable energy in Colombia.OECD2023.pdfDistributed renewable energy in Colombia.OECD2023.pdf
Distributed renewable energy in Colombia.OECD2023.pdf
SantiagoCardonaGallo
Mastering Secure Login Mechanisms for React Apps.pdf
Mastering Secure Login Mechanisms for React Apps.pdfMastering Secure Login Mechanisms for React Apps.pdf
Mastering Secure Login Mechanisms for React Apps.pdf
Brion Mario
02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf
ruioliveira1921
UHV UNIT-3 HARMONY IN THE FAMILY AND SOCIETY.pptx
UHV UNIT-3 HARMONY IN THE FAMILY AND SOCIETY.pptxUHV UNIT-3 HARMONY IN THE FAMILY AND SOCIETY.pptx
UHV UNIT-3 HARMONY IN THE FAMILY AND SOCIETY.pptx
ariomthermal2031
GIS Mapping Caddlance Portfolio 2025 .pdf
GIS Mapping Caddlance Portfolio 2025 .pdfGIS Mapping Caddlance Portfolio 2025 .pdf
GIS Mapping Caddlance Portfolio 2025 .pdf
sonam254547
module-4.1-Class notes_R and DD_basket-IV -.pdf
module-4.1-Class notes_R and DD_basket-IV -.pdfmodule-4.1-Class notes_R and DD_basket-IV -.pdf
module-4.1-Class notes_R and DD_basket-IV -.pdf
ritikkumarchaudhury7
RES REVIEW 21qqqqqqqqqqqqqqqq1sbsjsnskdndndksns
RES REVIEW 21qqqqqqqqqqqqqqqq1sbsjsnskdndndksnsRES REVIEW 21qqqqqqqqqqqqqqqq1sbsjsnskdndndksns
RES REVIEW 21qqqqqqqqqqqqqqqq1sbsjsnskdndndksns
lakshmirajanna1983
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptxUnit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Kirankumar Jagtap
Using 3D CAD in FIRST Tech Challenge - Fusion 360
Using 3D CAD in FIRST Tech Challenge - Fusion 360Using 3D CAD in FIRST Tech Challenge - Fusion 360
Using 3D CAD in FIRST Tech Challenge - Fusion 360
FTC Team 23014
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptxBrown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
shafieqadwasyazanee
FIRST Tech Challenge/Robotics: Scouting out the competition
FIRST Tech Challenge/Robotics: Scouting out the competitionFIRST Tech Challenge/Robotics: Scouting out the competition
FIRST Tech Challenge/Robotics: Scouting out the competition
FTC Team 23014
Artificial intelligence and Machine learning in remote sensing and GIS
Artificial intelligence  and Machine learning in remote sensing and GISArtificial intelligence  and Machine learning in remote sensing and GIS
Artificial intelligence and Machine learning in remote sensing and GIS
amirthamm2083
wind energy types of turbines and advantages
wind energy types of turbines and advantageswind energy types of turbines and advantages
wind energy types of turbines and advantages
MahmudHalef
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
ssuserb91a20
PLANT CELL REACTORS presenation PTC amity
PLANT CELL REACTORS presenation PTC amityPLANT CELL REACTORS presenation PTC amity
PLANT CELL REACTORS presenation PTC amity
UrjaMoon
Software security: Security a Software Issue
Software security: Security a Software IssueSoftware security: Security a Software Issue
Software security: Security a Software Issue
Dr Sarika Jadhav
UHV unit-2UNIT - II HARMONY IN THE HUMAN BEING.pptx
UHV unit-2UNIT - II HARMONY IN THE HUMAN BEING.pptxUHV unit-2UNIT - II HARMONY IN THE HUMAN BEING.pptx
UHV unit-2UNIT - II HARMONY IN THE HUMAN BEING.pptx
ariomthermal2031
Introduction to 3D Printing Technology.pptx
Introduction to 3D Printing Technology.pptxIntroduction to 3D Printing Technology.pptx
Introduction to 3D Printing Technology.pptx
pprakash21252
Caddlance PortfolioMixed Projects 2024.pdf
Caddlance PortfolioMixed Projects 2024.pdfCaddlance PortfolioMixed Projects 2024.pdf
Caddlance PortfolioMixed Projects 2024.pdf
sonam254547
Production Planning & Control and Inventory Management.pptx
Production Planning & Control and Inventory Management.pptxProduction Planning & Control and Inventory Management.pptx
Production Planning & Control and Inventory Management.pptx
VirajPasare
Distributed renewable energy in Colombia.OECD2023.pdf
Distributed renewable energy in Colombia.OECD2023.pdfDistributed renewable energy in Colombia.OECD2023.pdf
Distributed renewable energy in Colombia.OECD2023.pdf
SantiagoCardonaGallo
Mastering Secure Login Mechanisms for React Apps.pdf
Mastering Secure Login Mechanisms for React Apps.pdfMastering Secure Login Mechanisms for React Apps.pdf
Mastering Secure Login Mechanisms for React Apps.pdf
Brion Mario
02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf
ruioliveira1921
UHV UNIT-3 HARMONY IN THE FAMILY AND SOCIETY.pptx
UHV UNIT-3 HARMONY IN THE FAMILY AND SOCIETY.pptxUHV UNIT-3 HARMONY IN THE FAMILY AND SOCIETY.pptx
UHV UNIT-3 HARMONY IN THE FAMILY AND SOCIETY.pptx
ariomthermal2031
GIS Mapping Caddlance Portfolio 2025 .pdf
GIS Mapping Caddlance Portfolio 2025 .pdfGIS Mapping Caddlance Portfolio 2025 .pdf
GIS Mapping Caddlance Portfolio 2025 .pdf
sonam254547

THE MOST SECURE MESSAGING APP (information security)

  • 1. PARUL UNIVERSITY Create by :: Umang Talpara(170303105342) Parth Thummar(170303105352) Pramay Thumar(170303105350) Class: Cse 6B1(IS)
  • 2. THE MOST SECURE MESSAGING APP All around the world, users turn to Viber to have open and authentic conversations with their friends, family and colleagues. With Viber you can rest assured, knowing that your personal chats are always protected and private and that all your conversations are your own. Our mission is to protect that privacy so you never have to think twice about what you can or cant share when youre using Viber.
  • 3. WE DONT READ OR LISTEN TO ANY OF YOUR CHATS AND CALLS Unlike other messaging apps, Viber cant read your personal chats (including one-on-one chats and group chats) or listen in on your audio or video calls. We cant access your messages since we use end-to-end encryption by default. You dont have to go out of your way to turn it on. This means that your private and group communications are completely encrypted so that only you and the people youre talking to can read or hear them.
  • 4. WE CANT AND DONT SELL YOUR CONTENT When your chats are protected by end-to-end encryption, no one can access them. Perhaps most importantly, Viber doesnt have access to themwhich means nothing you share can be used to target you with ads later. Other messaging apps will not fully encrypt your chats automatically for you unless you actively turn on the encryption mode. This means that some of these apps can access, read and sell your private conversations to other 3rd parties or advertisers. Vibers policy guarantees that we cant sell your private information since we chose to have no access to your private chats and calls in the first place. So, you can be sure you wont mysteriously see ads related to something you were just talking about with a friend on Viber.
  • 5. MORE THAN ENCRYPTION Not only are your communications protected by end-to-end encryption by default, nothing you share is ever stored on Vibers servers once delivered. In fact, the messages you send make their way from your device to the recipients as an encrypted code. If the recipients phone is off or they dont have an internet connection, for example, your message will wait patiently on Vibers servers for a limited timestill safe and encrypteduntil their device is prepared to receive and decrypt it.
  • 6. 100% privacy you can trust:: Thanks to end-to-end encryption, any type of information you share will always remain between yourself and the person youre talking to. This means you never have to think twice about what you can or cant share when youre using Viber.
  • 7. IN-TRANSIT ENCRYPTION For extra protection, everything Viber sends from your device to the server on its way to your recipients device is encrypted as it travels across the internet.
  • 8. END-TO-END ENCRYPTION BY DEFAULT Messages you send make their way from your device to the recipients in the form of an encrypted code that only their device can translate to plain text using an encryption key. Encryption keys exist only on user devices and nowhere else. So, no one not even Viber can read your messages.
  • 9. TRUST YOUR CONTACTS Verify the identity of the person youre communicating with. In your chat info screen, authenticate and confirm that the person youre chatting with is who they say they are. This provides you with an extra level of security protection if anything changes with your contact.
  • 10. An added sense of privacy:: While Vibers end-to-end encryption by default gives users peace of mind, sometimes we need even more privacy. These privacy features enable users to share extra-sensitive information.
  • 11. HIDDEN CHATS Planning a surprise party and dont want anyone to accidentally see your conversation? Hide conversations from your main chat list and access them whenever you need to with a PIN.
  • 12. SELF-DESTRUCTING CHATS Secret Chats lets you set a self-destruct timer for every message in your conversation so that after your message is read, it is automatically deleted from the Viber chat.
  • 13. STAY UNDER THE RADAR Control when others can see your online status and the delivery status of the messages they send you.