Abstract
Messaging services are usually provided within social network platforms and allow these platforms to collect additional information about users, such as what time, for how long, with whom, and where a user communicates. This information allows the identification of users and is available to the messaging service provider even when communication is encrypted end-to-end. Thus, a gap still exists for alternative messaging services that enable anonymous and confidential communication and that are independent of a specific online service. Online services can still be used to support this messaging service, but in a way that enables users to communicate anonymously and without the knowledge and scrutiny of the online services. In this paper, we propose messaging using steganography and online services to support anonymous and confidential communication. In the proposed messaging service, only the sender and the receiver are aware of the existence of the exchanged data, even if the online services used or other third parties have access to the exchanged secret data containers. This work reviews the viability of using existing online services to support the proposed messaging service. Moreover, a proof-of-concept of the proposed message service is implemented and tested using two online services acting as proxies in the exchange of encrypted information disguised within images and links to those images. The obtained results confirm the viability of such a messaging service.
Reference61 articles.
1. Family E-Chat Group Use Was Associated with Family Wellbeing and Personal Happiness in Hong Kong Adults amidst the COVID-19 Pandemic
2. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far
https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html
3. European Parliament and Council Regulation (EC) No 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation);Off. J. Eur. Union,2016
4. End-to-End Encrypted Messaging Protocols: An Overview
5. Analyzing characteristic host access patterns for re-identification of web user sessions;Herrmann;Proceedings of the Nordic Conference on Secure IT Systems,2010