End-to-End Encryption: Skype’s New Security Feature

End-to-End Encryption: Skype’s New Security Feature

With more targeted attacks on social networking services than ever, private conversations with your business partners can become public information. To prevent this, Skype has released a new security update. It ensures complete privacy by encrypting all types of communication. Here are some of its elements:

Benefits of using Private Conversations

The new feature is named ‘Private Conversations’ by Microsoft. It allows all audio calls, text messages, and multimedia messages to be encrypted. This means that when the feature is enabled, only the sender and receiver will be able to view or hear the transmissions. Even if they were to be intercepted, their contents would be totally garbled.

Although Skype has already been providing basic encryption to its service, elevating this feature to prevents unintended parties from tapping into private conversations. This is called "end-to-end encryption." It ensures peace of mind to more than 300 million users.

Beta stage of testing

Currently still in its testing stage, end-to-end encryption is available only in the beta version of Skype Insider. To activate it, select “new private conversation” from another user’s profile or Skype’s “compose” menu.

Currently, Private Conversations do not support video chat. And although conversation contents are encrypted, conversation details can still be accessed by Skype.

Other end-to-end encrypted VoIP services

From free consumer communication apps like WhatsApp to business solutions like RingCentral, end-to-end encryption is becoming more prevalent every day. It's also effective on various other VoIP services.

Skype for Business sells it as a simple, DIY telecom solution. But with cyber attacks getting more sophisticated every day and the increasing number of data security regulations, a lot can go wrong. If you're interested in switching to a VoIP service, or want us to assess the security of your current solution, give us a call.

Published with permission from TechAdvisory.org. Source.