By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Unspoken risk: Human factors undermine trusted platforms | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Unspoken risk: Human factors undermine trusted platforms | Computer Weekly
News

Unspoken risk: Human factors undermine trusted platforms | Computer Weekly

News Room
Last updated: 2025/05/06 at 2:25 PM
News Room Published 6 May 2025
Share
SHARE

By

Published: 06 May 2025

The Signal leak incident in which a journalist was inadvertently added to a group chat discussing classified American military operations – underscores a chilling truth: even the most secure platforms are vulnerable to human error. This wasn’t a breakdown in encryption or a zero-day exploit. It was a simple, all-too-human mistake with potentially devastating consequences; a stark reminder of the high stakes involved in cyber security.

Are encrypted platforms like Signal safe?

Considering the design of the Signal messaging application and inherent security controls, the answer is yes. Encrypted messaging platforms are technically sound, offering state-of-the-art end-to-end encryption. However, encryption is not a substitute for judgment or process. These tools are vulnerable to misuse and abuse if contextual governance and user discipline are lacking. The assumption that secure tools ensure secure communication is dangerously misleading. Human error – misaddressing messages, mismanaging access, or misunderstanding context – can completely undermine even the strongest security frameworks. Even the best examples of secure design can fail when you add humans. Tools rarely break, but the trust and control around them often do.

Consider this case study a caution and a call to action. Mistakes are inevitable, but systems can be designed to detect and minimise the impact of those errors. Communication security must be reframed as a human-centered challenge, where technical controls are complemented by cultural change and operational safeguards. Cyber security professionals who want to shape a human-centered approach to security should keep the following principles in mind.

  • Human error always trumps encryption: No matter how robust the cryptographic protocols or how secure the messaging platform, a single misstep – like adding the wrong participant to a sensitive group chat—can render all technical safeguards useless. Encryption secures data at rest and in transit but cannot prevent a user from unintentionally sharing that data with an unauthorised person. The weakest link is not the algorithm but the human operating it. 
  • A secure platform does not equal secure policy enforcement: Using a secure platform like Signal does not equate to having a secure communication policy – platform ≠ policy. While Signal provides strong encryption and privacy features, it cannot enforce organisational rules, manage information sensitivity, or prevent misuse by trusted users. Security isn’t embedded in the tool but in how it is used, governed, and monitored. Without clear policies regarding group management, participant vetting, discussion classification, and user accountability, even the most secure platforms can become vectors for accidental or malicious leaks.
  • Metadata is a hidden risk: Even when message content is encrypted, metadata still matters – and can be dangerously revealing. Metadata includes who is communicating, when, how often and from where. In the context of the Signal leak, while the messages may have been protected, specific participant patterns in communication could have exposed sensitive operational insights. Adversaries can exploit metadata to map networks, infer relationships, track activity patterns, or time-sensitive actions without decrypting a single word.
  • Zero-trust applies to communications too: Zero-trust is often applied to networks, identities and endpoints but in today’s threat landscape it must also extend to communications. Just because a message is sent within an encrypted app doesn’t mean the recipient is verified, appropriate, or even authorized to receive that information. In the case of the Signal leak, the breach didn’t happen through technical compromise – it happened because assumed trust was misplaced. Applying zero-trust principles to communications means verifying every participant device’s security posture, controlling access dynamically, auditing group activity and continuously validating identity and context. 

Setting practical boundaries

Security doesn’t stop at the algorithm; it must encompass behavior, policy, and trust boundaries. There are practical steps CISOw can take to mitigate human factors:

  • Implement internal-only communication apps or hardened versions of Signal-like apps under controlled infrastructure
  • Segment communications by classification level, such as operational, strategic, or confidential, to restrict group owners from adding participants outside a verified user directory
  • Use AI-based monitoring to detect anomalies in group formation or message flow
  • Conduct training that embeds “trust but verify” habits by simulating breaches to improve behavior under stress
  • Adopt controls that minimise metadata exposure, limit group visibility and anonymize or obfuscate communication patterns wherever possible.

CISOs must move from securing tools to securing behaviours. Building technical trust is step one, and creating a culture of secure communication is now step zero. Adding this step is the key to mitigating human-centric risks in messaging platforms.

Aditya K Sood is vice president of security engineering and AI strategy at Aryaka.



Read more on Web application security


Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article New Smaller, Lighter, Cheaper Surface Pro and Surface Laptop Arrive Soon
Next Article We Tested the 10 Best Open Source Productivity Software in 2025
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Steven Bartlett-backed health startup faces another ad ban – UKTN
News
African e-commerce startups raised $11.3M in Q1 amid decline
Computing
New report tips key difference between Samsung's Galaxy S26 and Galaxy S26 Ultra
News
Half of US states now have laws banning or regulating cellphones in schools
News

You Might also Like

News

Steven Bartlett-backed health startup faces another ad ban – UKTN

2 Min Read
News

New report tips key difference between Samsung's Galaxy S26 and Galaxy S26 Ultra

6 Min Read

Half of US states now have laws banning or regulating cellphones in schools

8 Min Read
News

Summer Savings Start Here: The Best HP Early Memorial Deals On Laptops, Desktops, and Printers

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?