"Research Offers Solution to Encrypted Messages Being Hacked before Sending or after Receipt"

According to researchers from the University of Surrey, message applications must do more to protect user data from undetected malware or over-the-shoulder eavesdropping that bypasses encryption before a message is sent. To combat this issue of close location hacking, researchers from the University of Surrey's School of Computer Sciences developed Secure Node End-2-Encryption (SNE2EE), a new end-to-end encryption mechanism that protects users' communications at a much higher level than is currently seen on popular applications. For example, current messaging apps encrypt data transfers from one device to another, but not messages typed or received on either end. When an unencrypted message is received, there is no guarantee that it will be read by the intended recipient. The SNE2EE provides four levels of privacy protection by combining software and hardware with multi-factor authentication (MFA) and biometric data tools, as well as an overlay screen or application used to decrypt the message. This article continues to discuss the team's SNE2EE solution. 

University of Surrey reports "Research Offers Solution to Encrypted Messages Being Hacked before Sending or after Receipt"

Submitted by Anonymous on