Add Tribune As Your Trusted Source
TrendingVideosIndia
Opinions | CommentEditorialsThe MiddleLetters to the EditorReflections
UPSC | Exam ScheduleExam Mentor
State | Himachal PradeshPunjabJammu & KashmirHaryanaChhattisgarhMadhya PradeshRajasthanUttarakhandUttar Pradesh
City | ChandigarhAmritsarJalandharLudhianaDelhiPatialaBathindaShaharnama
World | ChinaUnited StatesPakistan
Diaspora
Features | The Tribune ScienceTime CapsuleSpectrumIn-DepthTravelFood
Business | My Money
News Columns | Straight DriveCanada CallingLondon LetterKashmir AngleJammu JournalInside the CapitalHimachal CallingHill ViewBenchmark
Don't Miss
Advertisement

Red Fort car blast: Module communicated via end-to-end encrypted app

Photo for representational purpose.

Unlock Exclusive Insights with The Tribune Premium

Take your experience further with Premium access. Thought-provoking Opinions, Expert Analysis, In-depth Insights and other Member Only Benefits
Yearly Premium ₹999 ₹349/Year
Yearly Premium $49 $24.99/Year
Advertisement

As the investigation intensifies in the Red Fort car blast, a new detail has emerged indicating that the accused communicated with each other via application that use default end-to-end encryption.

Advertisement

Sources said Dr Umer un-Nabi, Dr Muzammil Ahmad Ganaie and Dr Shaheen Shahid linked to Al-Falah University were in constant touch through an encrypted platform called Threema app.

Advertisement

Although the application is banned in the country, they were likely using Virtual Private Networks (VPNs) to bypass the system.

A unique feature of this particular application is that the user does not require any phone number or email ID to create an account, making it extremely difficult to trace the user for the investigators.

It works through unique user IDs not linked to mobile numbers or SIM cards and the communication on Threema is end-to-end encrypted and users can even run the app through private servers.

Advertisement

The accused reportedly created their own private Threema server to communicate securely and was allegedly used to share sensitive documents, maps and layouts related to the Delhi blast conspiracy.

The investigators suspect that detailed planning of location sharing and task allocation was done through this server.

The three doctors extensively used Threema for encrypted chats, sharing of documents and designs and voice communication, allowing them to avoid standard mobile networks entirely.

For additional secrecy, Threema enables users to delete messages from both ends and does not store any metadata, making it difficult to trace digital footprints.

According to intelligence agencies, this closed Threema network played a crucial role in the planning and coordination of the Red Fort car blast.

Investigation teams are also tracking whether Threema server they used was hosted inside India or abroad. Sources said the app was used to transfer restricted material and coded messages among members of the module.

Key features of Threema

A user does not require any phone number or email ID to create an account on Threema, making it extremely difficult to trace the user for the investigators

As one can even run the app through private servers, the accused shared sensitive documents, maps and layouts related to the Delhi blast conspiracy

Threema app enables users to delete messages from both ends and does not store any metadata, making it difficult to trace digital footprints

Advertisement
Show comments
Advertisement