Red Fort car blast: Module communicated via end-to-end encrypted app
Unlock Exclusive Insights with The Tribune Premium
Take your experience further with Premium access. Thought-provoking Opinions, Expert Analysis, In-depth Insights and other Member Only BenefitsAs the investigation intensifies in the Red Fort car blast, a new detail has emerged indicating that the accused communicated with each other via application that use default end-to-end encryption.
Sources said Dr Umer un-Nabi, Dr Muzammil Ahmad Ganaie and Dr Shaheen Shahid linked to Al-Falah University were in constant touch through an encrypted platform called Threema app.
Although the application is banned in the country, they were likely using Virtual Private Networks (VPNs) to bypass the system.
A unique feature of this particular application is that the user does not require any phone number or email ID to create an account, making it extremely difficult to trace the user for the investigators.
It works through unique user IDs not linked to mobile numbers or SIM cards and the communication on Threema is end-to-end encrypted and users can even run the app through private servers.
The accused reportedly created their own private Threema server to communicate securely and was allegedly used to share sensitive documents, maps and layouts related to the Delhi blast conspiracy.
The investigators suspect that detailed planning of location sharing and task allocation was done through this server.
The three doctors extensively used Threema for encrypted chats, sharing of documents and designs and voice communication, allowing them to avoid standard mobile networks entirely.
For additional secrecy, Threema enables users to delete messages from both ends and does not store any metadata, making it difficult to trace digital footprints.
According to intelligence agencies, this closed Threema network played a crucial role in the planning and coordination of the Red Fort car blast.
Investigation teams are also tracking whether Threema server they used was hosted inside India or abroad. Sources said the app was used to transfer restricted material and coded messages among members of the module.
Key features of Threema
A user does not require any phone number or email ID to create an account on Threema, making it extremely difficult to trace the user for the investigators
As one can even run the app through private servers, the accused shared sensitive documents, maps and layouts related to the Delhi blast conspiracy
Threema app enables users to delete messages from both ends and does not store any metadata, making it difficult to trace digital footprints