SlideShare a Scribd company logo
1 of 14
PARUL UNIVERSITY
Create by ::
Umang Talpara(170303105342)
Parth Thummar(170303105352)
Pramay Thumar(170303105350)
Class: Cse 6B1(IS)
THE MOST SECURE MESSAGING APP
 All around the world, users turn to
Viber to have open and authentic
conversations with their friends,
family and colleagues. With Viber
you can rest assured, knowing
that your personal chats are
always protected and private and
that all your conversations are
your own. Our mission is to
protect that privacy so you never
have to think twice about what
you can or can’t share when
you’re using Viber.
WE DON’T READ OR LISTEN TO ANY OF YOUR
CHATS AND CALLS
 Unlike other messaging apps, Viber
can’t read your personal chats (including
one-on-one chats and group chats) or
listen in on your audio or video calls. We
can’t access your messages since we
use end-to-end encryption by default.
You don’t have to go out of your way to
turn it on. This means that your private
and group communications are
completely encrypted so that only you
and the people you’re talking to can
read or hear them.
WE CAN’T AND DON’T SELL YOUR CONTENT
 When your chats are protected by end-to-end
encryption, no one can access them. Perhaps most
importantly, Viber doesn’t have access to them—which
means nothing you share can be used to target you with
ads later. Other messaging apps will not fully encrypt
your chats automatically for you unless you actively turn
on the encryption mode. This means that some of these
apps can access, read and sell your private
conversations to other 3rd parties or advertisers. Viber’s
policy guarantees that we can’t sell your private
information since we chose to have no access to your
private chats and calls in the first place. So, you can be
sure you won’t mysteriously see ads related to
something you were just talking about with a friend on
Viber.
MORE THAN ENCRYPTION
 Not only are your communications protected by
end-to-end encryption by default, nothing you
share is ever stored on Viber’s servers once
delivered. In fact, the messages you send make
their way from your device to the recipient’s as an
encrypted code. If the recipient’s phone is off or
they don’t have an internet connection, for
example, your message will wait patiently on
Viber’s servers for a limited time—still safe and
encrypted—until their device is prepared to receive
and decrypt it.
100% privacy you can trust::
Thanks to end-to-end encryption, any type of
information you share will always remain between
yourself and the person you’re talking to. This means
you never have to think twice about what you can or
can’t share when you’re using Viber.
IN-TRANSIT ENCRYPTION
 For extra protection, everything Viber
sends from your device to the server
on its way to your recipient’s device
is encrypted as it travels across the
internet.
END-TO-END ENCRYPTION
BY DEFAULT
 Messages you send make their way from
your device to the recipient’s in the form
of an encrypted code that only their
device can translate to plain text using an
encryption key. Encryption keys exist only
on user devices and nowhere else. So,
no one — not even Viber — can read
your messages.
TRUST YOUR CONTACTS
 Verify the identity of the person you’re
communicating with. In your chat info screen,
authenticate and confirm that the person you’re
chatting with is who they say they are. This
provides you with an extra level of security
protection if anything changes with your contact.
An added sense of privacy::
While Viber’s end-to-end encryption by default
gives users peace of mind, sometimes we need even
more privacy. These privacy features enable users to
share extra-sensitive information.
HIDDEN CHATS
 Planning a surprise party and don’t want
anyone to accidentally see your
conversation? Hide conversations from
your main chat list and access them
whenever you need to with a PIN.
SELF-DESTRUCTING CHATS
 Secret Chats lets you set a self-destruct timer
for every message in your conversation so that
after your message is read, it is automatically
deleted from the Viber chat.
STAY UNDER THE RADAR
 Control when others can see your online
status and the delivery status of the
messages they send you.
THE MOST SECURE MESSAGING APP (information security)

More Related Content

More from umang talpara (6)

Disaster management Emergency operation center
Disaster management Emergency operation centerDisaster management Emergency operation center
Disaster management Emergency operation center
 
Bhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talparaBhuj earthquake 2001 by:umang talpara
Bhuj earthquake 2001 by:umang talpara
 
EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)EARLY WARNING SYSTEM(EWS)
EARLY WARNING SYSTEM(EWS)
 
Daily milk Management
Daily milk ManagementDaily milk Management
Daily milk Management
 
Online test (java)
Online test (java)Online test (java)
Online test (java)
 
Disaster management cycle
Disaster management cycleDisaster management cycle
Disaster management cycle
 

Recently uploaded

ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
tuuww
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Lovely Professional University
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
Kamal Acharya
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
Kamal Acharya
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 

Recently uploaded (20)

ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
 
Lect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptxLect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptx
 
internship exam ppt.pptx on embedded system and IOT
internship exam ppt.pptx on embedded system and IOTinternship exam ppt.pptx on embedded system and IOT
internship exam ppt.pptx on embedded system and IOT
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
Roushan Kumar Java oracle certificate
Roushan Kumar Java oracle certificate Roushan Kumar Java oracle certificate
Roushan Kumar Java oracle certificate
 
Lect_Z_Transform_Main_digital_image_processing.pptx
Lect_Z_Transform_Main_digital_image_processing.pptxLect_Z_Transform_Main_digital_image_processing.pptx
Lect_Z_Transform_Main_digital_image_processing.pptx
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
 
E-Commerce Shopping for developing a shopping ecommerce site
E-Commerce Shopping for developing a shopping ecommerce siteE-Commerce Shopping for developing a shopping ecommerce site
E-Commerce Shopping for developing a shopping ecommerce site
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 

THE MOST SECURE MESSAGING APP (information security)

  • 1. PARUL UNIVERSITY Create by :: Umang Talpara(170303105342) Parth Thummar(170303105352) Pramay Thumar(170303105350) Class: Cse 6B1(IS)
  • 2. THE MOST SECURE MESSAGING APP  All around the world, users turn to Viber to have open and authentic conversations with their friends, family and colleagues. With Viber you can rest assured, knowing that your personal chats are always protected and private and that all your conversations are your own. Our mission is to protect that privacy so you never have to think twice about what you can or can’t share when you’re using Viber.
  • 3. WE DON’T READ OR LISTEN TO ANY OF YOUR CHATS AND CALLS  Unlike other messaging apps, Viber can’t read your personal chats (including one-on-one chats and group chats) or listen in on your audio or video calls. We can’t access your messages since we use end-to-end encryption by default. You don’t have to go out of your way to turn it on. This means that your private and group communications are completely encrypted so that only you and the people you’re talking to can read or hear them.
  • 4. WE CAN’T AND DON’T SELL YOUR CONTENT  When your chats are protected by end-to-end encryption, no one can access them. Perhaps most importantly, Viber doesn’t have access to them—which means nothing you share can be used to target you with ads later. Other messaging apps will not fully encrypt your chats automatically for you unless you actively turn on the encryption mode. This means that some of these apps can access, read and sell your private conversations to other 3rd parties or advertisers. Viber’s policy guarantees that we can’t sell your private information since we chose to have no access to your private chats and calls in the first place. So, you can be sure you won’t mysteriously see ads related to something you were just talking about with a friend on Viber.
  • 5. MORE THAN ENCRYPTION  Not only are your communications protected by end-to-end encryption by default, nothing you share is ever stored on Viber’s servers once delivered. In fact, the messages you send make their way from your device to the recipient’s as an encrypted code. If the recipient’s phone is off or they don’t have an internet connection, for example, your message will wait patiently on Viber’s servers for a limited time—still safe and encrypted—until their device is prepared to receive and decrypt it.
  • 6. 100% privacy you can trust:: Thanks to end-to-end encryption, any type of information you share will always remain between yourself and the person you’re talking to. This means you never have to think twice about what you can or can’t share when you’re using Viber.
  • 7. IN-TRANSIT ENCRYPTION  For extra protection, everything Viber sends from your device to the server on its way to your recipient’s device is encrypted as it travels across the internet.
  • 8. END-TO-END ENCRYPTION BY DEFAULT  Messages you send make their way from your device to the recipient’s in the form of an encrypted code that only their device can translate to plain text using an encryption key. Encryption keys exist only on user devices and nowhere else. So, no one — not even Viber — can read your messages.
  • 9. TRUST YOUR CONTACTS  Verify the identity of the person you’re communicating with. In your chat info screen, authenticate and confirm that the person you’re chatting with is who they say they are. This provides you with an extra level of security protection if anything changes with your contact.
  • 10. An added sense of privacy:: While Viber’s end-to-end encryption by default gives users peace of mind, sometimes we need even more privacy. These privacy features enable users to share extra-sensitive information.
  • 11. HIDDEN CHATS  Planning a surprise party and don’t want anyone to accidentally see your conversation? Hide conversations from your main chat list and access them whenever you need to with a PIN.
  • 12. SELF-DESTRUCTING CHATS  Secret Chats lets you set a self-destruct timer for every message in your conversation so that after your message is read, it is automatically deleted from the Viber chat.
  • 13. STAY UNDER THE RADAR  Control when others can see your online status and the delivery status of the messages they send you.