7 Jun 2013


WhatsApp Messenger screenshot.jpg
WhatsApp Messenger 2.8.2 running on iOS



Developer(s) WhatsApp Inc.
Stable release Android
2.9.5196 (May 16, 2013; 22 days ago)
2.9.7312 (May 21, 2013; 17 days ago)
BlackBerry OS
2.9.874 (January 25, 2013; 4 months ago)
BlackBerry 10
2.10.8002.1 (June 4, 2013; 3 days ago)
2.8.7 (December 7, 2012; 5 months ago)
Nokia Symbian (S60)
2.10.163 (May 29, 2013; 9 days ago)
Nokia Series 40
2.4.21 (April 23, 2013; 45 days ago)
Windows Phone
2.9.4 (February 24, 2013; 3 months ago)
Development status Active
Operating system Android, BlackBerry OS, BlackBerry 10, iOS, Series 40, Symbian and Windows Phone
Type Instant Messaging
Licence Proprietary
Website whatsapp.com

WhatsApp Messenger is a proprietary, cross-platform instant messaging application for smartphones. In addition to text messaging, users can send each other images, video, and audio media messages. The client software is available for Android, BlackBerry OS, BlackBerry 10, iOS, Series 40, Symbian (S60), and Windows Phone. WhatsApp Inc. was founded in 2009 by Brian Acton and Jan Koum, both veterans of Yahoo!, and is based in Santa Clara, California.
Competing with a number of Asian-based messaging services (like LINE, KakaoTalk, and WeChat), WhatsApp was handling ten billion messages per day as of August 2012, growing from two billion in April 2012 and one billion the previous October. According to the Financial Times, WhatsApp "has done to SMS on mobile phones what Skype did to international calling on landlines."


WhatsApp uses a customized version of the open standard Extensible Messaging and Presence Protocol (XMPP). Upon installation, it creates a user account using one's phone number as username (Jabber ID: [phone number]@s.whatsapp.net). WhatsApp software automatically compares all the phone numbers from the device's address book with its central database of WhatsApp users to automatically add contacts to the user's WhatsApp contact list. Previously the Android and S40 versions used an MD5-hashed, reversed-version of the phone's IMEI as password, while the iOS version used the phone's Wi-Fi MAC address instead of IMEI. A recent update now generates a random password on the server side.
Multimedia messages are sent by uploading the image, audio or video to be sent to a HTTP server and then sending a link to the content along with its Base64 encoded thumbnail (if applicable).
Until August 2012, messages were sent in unencrypted plain-text format, making the system vulnerable to session hijacking. As of August 15, 2012, the WhatsApp support staff claim messages are encrypted in the "latest version" of the WhatsApp software for iOS and Android (not including BlackBerry, Windows Phone and Symbian), without specifying the implemented cryptographic method.


In May 2011, a security hole was reported in WhatsApp which left user accounts open for hijacking. Since May 2011, it has been reported that communications made by WhatsApp are not encrypted, and data is sent and received in plaintext, meaning messages can easily be read if packet traces are available
According to some sources, it is believed that the hijacking hack was performed, and later fixed by helping WhatsApp reproduce it on Android and Symbian, by Liroy van Hoewijk, CEO of CoreISP.net. Then, in May 2012 security researchers noted that new updates of WhatsApp no longer sent messages as plaintext, however, the cryptographic method implemented was subsequently described as "broke
In September 2011, a new version of the WhatsApp Messenger application for iPhones was released. In this new version, the developer has closed a number of critical security holes that allowed forged messages to be sent and messages from any WhatsApp user to be read
On January 6, 2012, an unknown hacker published a website (WhatsAppStatus.net) which made it possible to change the status of an arbitrary WhatsApp user, as long as the phone number was known. To let it work, it only required a restart of the app. According to the hacker, it is only one of the many security issues in WhatsApp. On January 9, WhatsApp reported to have solved the issue. In reality, the only measure that was taken was blocking the website's IP address. As a reaction, a Windows tool was made available for download providing the same functionality. This issue has since been resolved in the form of an IP check on currently logged in session.
On January 13, 2012, WhatsApp was pulled from the iOS App Store. The reason was not disclosed. The app was added back to the App Store four days later.
Using WhatsAPI, German Tech site The H demonstrated how to hijack any WhatsApp account on September 14, 2012. Shortly after a legal threat to WhatsAPI's developers was alleged, characterized by The H as "an apparent reaction" to security reports, and WhatsAPI's source code was taken down. The WhatsAPI team has since returned to active development.


Another issue was witnessed on November 28, 2012 and before (WA blog post about it is from January 12), though this is not a security concern at all but more a problem with "chain messages", when users got spam messages and ignorantly forwarded hoax messages to people on their contact lists. The WhatsApp team clearly mentioned on its website that all such messages are fake This has not been the work of hackers, but simply the work of people randomly forwarding nonsense, a problem on any social media.
A major privacy and security issue has been the subject of a joint Canadian-Dutch government investigation. The primary concern was that WhatsApp required users to upload their entire mobile phone's address book to WhatsApp servers so that WhatsApp could discover who, among the users' existing contacts, is available via WhatsApp. While this is a fast and convenient way to quickly find and connect the user with contacts who are also using WhatsApp, it means that their address book was then mirrored on the WhatsApp servers, including contact information for contacts who are not using WhatsApp. However, this information was stored as a hash and without additional identifying information such as a name.
On March 31, 2013, the governing body of telecommunications affairs in Saudi Arabia, the Communications and Information Technology Commission (CITC), issued a statement regarding possible measures against WhatsApp, among other applications, unless the service providers took serious steps in order to comply with monitoring and privacy regulations.


  1. Nice it seems to be good post... It will get readers engagement on the article since readers engagement plays an vital role in every blog.. i am expecting more updated posts from your hands.
    WhatsApp API

  2. Great article Lot's of information to Read...Great Man Keep Posting and update to People..Thanks Funny Whatsapp group link to Join

  3. Great Article android based projects

    Java Training in Chennai

    Project Center in Chennai

    Java Training in Chennai

    projects for cse

    The Angular Training covers a wide range of topics including Components, Angular Directives, Angular Services, Pipes, security fundamentals, Routing, and Angular programmability. The new Angular TRaining will lay the foundation you need to specialise in Single Page Application developer. Angular Training


Deeksha. Powered by Blogger.