Elon Musk, CEO of SpaceX and Tesla has recently become the new owner of Twitter and he is already on track to tweaking things with Twitter.
He made a tweet on Thursday that Twitter DM’s will be equipped with end-to-end encryption just like the Signal messaging app, thus possibly bringing better privacy and security over user communications.
The Twitter acquisition by Elon Musk saw a transaction value of $44 Billion US Dollars, and $54.20 per share in cash. The deal is expected to be closed in the next six months and will be converted to a private firm.
“Free speech is the bedrock of a functioning democracy, and Twitter is the digital town square where matters vital to the future of humanity are debated,” said Musk.
He also added that “I also want to make Twitter better than ever by enhancing the product with new features, making the algorithms open-source to increase trust, defeating the spam bots, and authenticating all humans.”
The lack of end-to-end encryption for Twitter DMs has been concern, with the Electronic Frontier Foundation (EFF) mentioning how it could affect user privacy and safety. The non-encryption gives Twitter the access to DMs, thus handing over the communication to law enforcement if needed.
The independent human rights impact assessment also highlighted the risks of end-to-end encryption causing some consequences for improved privacy protections, including facilitating child exploitation, spreading hate speech, and distribution of child sexual abuse material (CSAM).
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter. You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…