The unrestricted use of media results in several problems related to information protection, which can be used by hackers to commit various cybercrimes. The possibility of anonymity, individuals engaged in committing crimes using their knowledge of Information Technology, and the existence of certain server vulnerabilities enhance the likelihood of scams. In general, any moral or physical harm resulting from an online attack violates the principles of Human Rights.
Messenger and Instagram chat are undergoing a series of improvements and have influenced a study promoted by META: the Independent Human Rights Impact Survey (HRIA), commissioned from Business for Social Responsibility (BSR). The survey evaluated 45 recommendations involving end-to-end encryption mechanisms, aiming to make digital life safer, identifying updates that may or may not confront basic ethical issues.
The definition of end-to-end encryption and its advantages and disadvantages.
This term refers to a sequence of cryptographic keys that keep shared content private, ensuring the inviolability of a message. Cryptography has advanced considerably, as seen in WhatsApp modifications; however, in some cases, powerful groups manage to circumvent rules and access confidential materials. Given the importance of the research findings, the final report was made available to raise awareness among other companies.
Of the 45 topics studied, approximately 34 will be considered only for initial testing, with only 6 planned for implementation, all of which are linked to decisions regarding data protection encryption. The main advantage, the subject of this analysis, is to make virtual experiences more assertive and respectful. While this is seen as extremely positive, there is another side to it: what to do when a dialogue constitutes evidence in an investigation? Experts will find the answer by delving deeper into HRIA.
Trying to be a pioneer in initiatives that strengthen digital citizenship, META aims to forge partnerships and continue its experiments, putting the most promising hypotheses into practice. All its organizers consider it fundamental to protect freedom of expression, identity, and everything intrinsic to human dignity. And in the innovation of future technologies, a joint effort is expected to implement clear and well-founded policies on privacy on the networks.



















