Facebook blames iOS for Jeff Bezos' phone hacking
Facebook blames iOS for Jeff Bezos’ phone hacking

Facebook has blamed Apple’s operating system after the hacking incident of Jeff Bezos’s Phone. They said that Whatsapp’s end to end encryption of the conversations are highly efficient and the fault might have been in the operating system. However, the investigators claim that his phone was hacked after he received a 4.4Mb file through WhatsApp. This is similar to how 1400 phones of journalists were broken in to by Pegasus software in Israel last year.

Nick Clegg, the Vice President, Facebook Global Affairs and Communication, said in his interview with BBC that WhatsApp’s end to end encryption is unhackable and he blamed Apple’s operating system for the incident. “It sounds like something on the, you know, what they call the operate, operated on the phone itself. It can’t have been anything on the, when the message was sent, in transit, because that’s end-to-end encrypted on WhatsApp”, he said.

Facebook blames iOS for Jeff Bezos' phone hacking
Facebook blames iOS for Jeff Bezos’ phone hacking

The investigation was carried out by a firm called FTI consulting and they reported that, after Bezos received the video file, his phone started sending out unusually large numbers of data which also included his intimate messages with girlfriend Lauren Sanchez.

“As sure as you can be that the technology of end-to-end encryption cannot, other than unless you have a handset, or you have the message at either end, cannot be hacked into,” Clegg said. He claims that something might have affected the phone’s operating system.

Apple has not yet commented on these statements.

WhatsApp messages are encrypted end to end which means that only the sender and receiver can view the messages. But NSO has tested WhatsApp’s video calling system by installing spyware to snoop on selected users.

Prasanto K Roy, leading tech policy and media consultant said that the E2EE or end to end encrypted apps provide security and the calls and messages cannot be intercepted from them without enormous computing resources.

“But once anyone can get to your handset, whether a human or a piece of software, the encryption doesn’t matter anymore. Because on your handset, it’s all decrypted,” Roy added.

Must Check:

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Donald Trump fires cybersecurity chief Chris Krebs after he debunked voter fraud theories

Late Tuesday evening, President Donald Trump fired the chief of the CISA…

New Crypto regulations in Malaysia come into effect

The Malaysian Securities Commission (SC) announced that newly amended regulations on cryptocurrency…

71% increase in ransomware attacks in healthcare sector in October 2020

Following the joint advisory issued by three federal agencies, CheckPoint Security published…