Recent revelations have shaken the U.S. telecommunications industry to its core. According to reports from major news outlets like the New York Times and Wall Street Journal, as well as confirmations from U.S. government agencies, a highly skilled group of hackers known as Salt Typhoon - believed to be backed by the Chinese government - has breached key components of the U.S. communications infrastructure. The group’s target? The communication systems that enable legally mandated wiretapping, with the apparent goal of surveilling high-ranking U.S. officials.
While this story has immediate implications for national security, it also poses a larger threat: the breach isn’t limited to those under government investigation. Salt Typhoon exploited vulnerabilities across the boundaries of telecommunication networks, meaning that potentially the communications of anyone in the USA could be compromised.In light of these events, both the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are urging U.S. citizens, government officials, and industry leaders to adopt end-to-end encrypted (E2EE) communication tools for their everyday conversations. Why? E2EE ensures that only the intended recipients of communications can access the content. Even if hackers breach the servers of a communication provider, the contents of encrypted messages, calls, or files remain unreadable.
But what does end-to-end encryption mean? Sadly, there are many products that claim to be secure, but suffer from significant, insecure design compromises. To start with, remember that similar wiretapping backdoors that are being targeted by Salt Typhoon are built into many of the communication and collaboration products developed in the U.S., to comply with government mandates.
“End-to-end encryption” can’t just be a bolt-on feature or two, or marketing language, if you want it to protect you. It needs to be serious and thorough. For example, at Wire, our communication and collaboration platform was designed from the ground up to protect privacy and security. With Wire’s end-to-end encryption, only the end users involved in a conversation can decrypt the data. Ever. This means that even if our servers - or any intermediate systems - were to be compromised, the content of messages, calls, and files remains protected from prying eyes.
It’s essential that high-ranking government officials and politicians, as well as U.S. industry leaders, recognize the magnitude of this threat. Salt Typhoon appears to have targeted government communications, but the depth of their intrusion means that everyone - regardless of whether they’re a government official - could potentially be vulnerable.
Organizations working on sensitive projects, whether in technology, intellectual property, research and development, or other critical areas, are especially at risk. The Salt Typhoon hack may be just the beginning, and we encourage all leaders in these industries to take proactive measures in securing their communications.
At Wire, we create cutting-edge E2EE technologies that ensure your communications are protected - even in a contested digital environment such as what’s playing out in the U.S. telecommunications sector.
In addition to paid offerings for governments and private-sector customers, we believe in the importance of secure communication for everyone. That’s why we offer Wire Free, our E2EE service available to anyone at no cost. Whether you’re a public servant, business leader, or simply someone who values their privacy, Wire Free empowers individuals with the same world-class protection that our enterprise customers enjoy.
The Salt Typhoon hack serves as a reminder that cybersecurity threats are constantly evolving, and no one is immune. However, by adopting the right tools, we can stay ahead of these threats. Wire is committed to providing the most secure communication solutions, and we’re proud to help protect your privacy in an increasingly connected world. Learn more at wire.com, or if you know you’re ready to explore, contact us.