{"id":74997,"date":"2017-06-13T06:00:56","date_gmt":"2017-06-13T13:00:56","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=74997"},"modified":"2025-08-31T20:00:05","modified_gmt":"2025-09-01T03:00:05","slug":"encrypted-calling","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/","title":{"rendered":"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?"},"content":{"rendered":"<p>We\u2019ve all heard the names before \u2013 WhatsApp, Viber, Telegram, Wire, Signal, Allo\u2026 with so many cyberattacks in the news recently, people have begun to rely on encrypted messaging apps to protect their privacy from potential hackers. These services secure end-to-end connections using varying tactics and levels of encryption \u2013 you may find yourself questioning what any of that means. How do you encrypt your messages? Can anyone do it? What is being protected when you use an encrypted messaging system? If encrypted messaging is so great, why isn\u2019t everyone using encrypted messages? It sure could put an end to all the celebrity phone hacks and government information leaks\u2026\u00a0 Here\u2019s what you should know about encryption, and find the answers to all your questions.<\/p>\n<p>When people <a href=\"https:\/\/www.ctl.io\/developers\/blog\/post\/five-popular-messaging-apps-encryption-behind-them\" target=\"_blank\" rel=\"noopener noreferrer\">encrypt<\/a> their communications, it means that only the sender and the recipient can see one another\u2019s messages. While the message is in transit, it cannot be decoded or unraveled by outsiders or the maker of the application, which allows for privacy and security. Some apps do this by protecting individual messages sent to and from the device, some have encryption built in, and others offer a \u201csecret\u201d mode that can be switched on and off. Certain apps, namely Wire and Signal, <a href=\"http:\/\/www.telegraph.co.uk\/technology\/0\/encryption-should-using\/\" target=\"_blank\" rel=\"noopener noreferrer\">encrypt messages by design.<\/a> By installing and signing into the app, all communications are automatically encrypted.<\/p>\n<p>People use encryption for all kinds of communication \u2013 for a long time, these apps could only offer encryption for text-based chat, but introducing encrypted calls has been <a href=\"https:\/\/www.wired.com\/2017\/04\/encrypted-chat-took-now-encrypted-callings-turn\/\" target=\"_blank\" rel=\"noopener noreferrer\">natural next-step<\/a> and layer of protection in today\u2019s digital world. Encrypted calls would be highly valuable, with the ability to thwart any snooping. However, developing the technology to create such protection for voice calls has proven difficult for programmers.<\/p>\n<p>One of the main challenges that developers face is mastering internet-based calls, which still are not the most reliable way to communicate. Wi-Fi or Ethernet connections are the most stable, but many people still use cellular data to make VoIP (or Voice Over Internet Protocol) calls. In 2014, Signal, one of the many platforms offering encrypted communication, began to offer encrypted calling despite the complications with dropped calls and connection reliability, as did Wire. When WhatsApp introduced encrypted calls and video chat to their one billion users in 2016, other secure messaging apps finally began to pick up the pace and develop secure calling services of their own.<\/p>\n<p>So, now that both encrypted texting services and encrypted calling services have been developed, it seems like all of our calls and texts should be secured by encryption, no questions asked. However, there are many factors slowing down adoption among potential users, one of the main reasons being that both parties must be using the same system for end-to-end encryption to function. Think about it this way \u2013 you may find an app that you love to use, but it might be difficult to convince all your friends and family to go through the steps to downloading and using the new app regularly. Everyone has their preferences, and getting everyone in your life to be on the same page can be difficult. Now, expand that to everyone in their lives \u2013 and so on, and so forth.<\/p>\n<h2>How to Keep Your Private Communications Safe<\/h2>\n<p>The resolution to this particular problem would be to fully <a href=\"https:\/\/www.the-parallax.com\/2017\/04\/21\/encrypted-messaging-open-source-success\/\" target=\"_blank\" rel=\"noopener noreferrer\">open source<\/a> these encryption products, so that people can communicate securely within different interfaces and applications. Developers can implement this by making all end-to-end encryption protocols the same, so they could speak to each other cross-product. While some small companies have adopted the Open Secure Telphony Network, or \u201cOTSN,\u201d many of the larger names in encryption \u2013 like Skype, Google, and Apple \u2013 have decided to brave the world of secure communication on their own, and forego open sourcing (much to the chagrin of people who need complete and total security). The potential security flaws with open-source code can be reason enough for these larger companies to privatize their communications, which defeats the whole purpose. Until developers find the right solution, what\u2019s the best way to keep your private communications safe?<\/p>\n<ul>\n<li><u>Avoid Risky Wi-Fi.<\/u> Don\u2019t trust unsecured Wi-Fi networks when sending personal information. While it\u2019s great in theory that Wi-Fi is almost always readily available, those unsecured networks are an easy target for hackers to gain access to hundreds of personal devices. If you send personal information over an open network, you don\u2019t know who could be spying on your device \u2013 or who could be sharing your data.<\/li>\n<li><u>Keep Your Secrets to Yourself.<\/u> Generally, it\u2019s a good idea to keep any super sensitive data off mobile devices and messaging apps. Besides not knowing who might be spying on your phone, devices can get lost or stolen, and physically broken into. There are many ways your data can be stolen from a phone, but if you never keep it there in the first place, you\u2019re much more likely to keep it secure.<\/li>\n<li><u>Security Software Goes a Long Way.<\/u> I highly recommend trusting a security software to have your back as a last resort. <a href=\"https:\/\/www.mcafeemobilesecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Mobile Security<\/a>, which is free for <a href=\"http:\/\/app.appsflyer.com\/com.wsandroid.suite?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> and <a href=\"http:\/\/app.appsflyer.com\/id724596345?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener noreferrer\">iOS<\/a>, will warn you if you\u2019re about to connect to an unsecured Wi-Fi network. That way, you\u2019ll be more cautious if you are about to send any personal information over your phone.<\/li>\n<\/ul>\n<p>Looking for more mobile security tips and trends? Be sure to follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, and like us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-68611 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" alt=\"\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg 200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-128x128.jpg 128w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve all heard the names before \u2013 WhatsApp, Viber, Telegram, Wire, Signal, Allo\u2026 with so many cyberattacks in the news&#8230;<\/p>\n","protected":false},"author":674,"featured_media":217168,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[4132,214],"coauthors":[3973],"class_list":["post-74997","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-mobile-app","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"We\u2019ve all heard the names before \u2013 WhatsApp, Viber, Telegram, Wire, Signal, Allo\u2026 with so many cyberattacks in the news recently, people have begun to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"We\u2019ve all heard the names before \u2013 WhatsApp, Viber, Telegram, Wire, Signal, Allo\u2026 with so many cyberattacks in the news recently, people have begun to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-13T13:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T03:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?\",\"datePublished\":\"2017-06-13T13:00:56+00:00\",\"dateModified\":\"2025-09-01T03:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/\"},\"wordCount\":920,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593-copy.jpg\",\"keywords\":[\"mobile app\",\"mobile security\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/\",\"name\":\"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593-copy.jpg\",\"datePublished\":\"2017-06-13T13:00:56+00:00\",\"dateModified\":\"2025-09-01T03:00:05+00:00\",\"description\":\"We\u2019ve all heard the names before \u2013 WhatsApp, Viber, Telegram, Wire, Signal, Allo\u2026 with so many cyberattacks in the news recently, people have begun to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593-copy.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593-copy.jpg\",\"width\":614,\"height\":410,\"caption\":\"Sad unhappy and disappointed man sitting at home on sofa in living room, Indian man received notification message with bad news, reading using smartphone app.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next? | McAfee Blog","description":"We\u2019ve all heard the names before \u2013 WhatsApp, Viber, Telegram, Wire, Signal, Allo\u2026 with so many cyberattacks in the news recently, people have begun to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next? | McAfee Blog","og_description":"We\u2019ve all heard the names before \u2013 WhatsApp, Viber, Telegram, Wire, Signal, Allo\u2026 with so many cyberattacks in the news recently, people have begun to","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-06-13T13:00:56+00:00","article_modified_time":"2025-09-01T03:00:05+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?","datePublished":"2017-06-13T13:00:56+00:00","dateModified":"2025-09-01T03:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/"},"wordCount":920,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593-copy.jpg","keywords":["mobile app","mobile security"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/","name":"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593-copy.jpg","datePublished":"2017-06-13T13:00:56+00:00","dateModified":"2025-09-01T03:00:05+00:00","description":"We\u2019ve all heard the names before \u2013 WhatsApp, Viber, Telegram, Wire, Signal, Allo\u2026 with so many cyberattacks in the news recently, people have begun to","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593-copy.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593-copy.jpg","width":614,"height":410,"caption":"Sad unhappy and disappointed man sitting at home on sofa in living room, Indian man received notification message with bad news, reading using smartphone app."},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/encrypted-calling\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"\u00a0We\u2019ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=74997"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74997\/revisions"}],"predecessor-version":[{"id":221807,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74997\/revisions\/221807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/217168"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=74997"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=74997"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=74997"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=74997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}