Check if end-to-end encryption is activated
It is always useful to check if the end-to-end encryption is activated properly for a conversation. We suggest verifying all devices in a conversation to be more secure from man-in-the-middle attacks.
Desktop
- Open the chat that you want to check.
- Click the title of the chat or on the three dots and then on Show information to open the details.
- Choose Encryption.
- If there is a closed, green Lock behind each name, the end-to-end encryption is activated.
Mobile
- Open the chat that you want to check.
- Tap the title of the chat or on the three dots and then on Show information to open the details.
- Choose Encryption.
- If there is a closed, green Lock behind each name, the end-to-end encryption is activated.
Verify users
If you notice that not all devices have the green icon, you can verify users one by one. This automatically verifies all devices on which the user has verified their chat backup.
Desktop
- Contact the user you want to verify and ask for a meeting or phone call.
- Open a 1:1 chat with the user you want to verify.
- Click on the chat title or the three dots and then on View information to open the details.
- Select Encryption.
- Click on Verify person.
- The other user must now accept the request.
- If the other user accepted the request on a mobile device, a QR code scanner opens on their device and your device displays a QR code. With two desktop devices, you will be asked to compare numbers.
- QR verification: Let the user scan the QR code and confirm that they have scanned the QR code.
- Number verification: Ask the other person to tap on Compare numbers instead of QR code if the number verification doesn't start automatically. Share the numbers with each other over a secure channel or by phone and both indicate whether the numbers match.
Mobile
- Contact the user you want to verify and ask for a meeting or phone call.
- Open a 1:1 chat with the user you want to verify.
- Tap on the chat title or the three dots and then on View Information to open the details.
- Select Encryption.
- Tap on Verify person.
- The other user must now accept the request.
- One of the two devices now displays a QR code scanner and the other a QR code.
- QR verification: The user whose device has opened the QR code scanner must now scan the QR code. The other confirms the identity of the user.
- Number verification: To start the number verification instead, the user whose device has opened the QR code scanner must tap on Compare numbers instead of QR code. Share the numbers with each other over a secure channel or by phone and both indicate whether the numbers match.
Lock screen
Activating the lock screen gives you additional security.
Mobile
- To access the settings, tap your profile picture or your name in the header of the screen.
- Tap Security.
- Tap Screen lock.
- Set a PIN code or choose to unlock the app with your biometric data.
Best practices for secure passwords
With the following tips you can increase the security of your passwords considerably without significant additional expenses. As TI-Messenger supplier we are obligated to point out these guidelines.
General Password Guidelines:
- Do not reuse passwords
- Avoid passwords that are easy to guess (e.g. 12345678 or your date of birth)
- Use upper and lower case letters, numbers and special characters
- Please use passwords with 12 or more characters (the longer the password the more secure)
- Keep passwords secret
- Unobserved password entry
- Do not use keyboard shortcuts and do not store passwords in your browser
- Passwords should only be noted down for emergencies
- If you note your passwords for emergencies, make sure to keep the note hidden and not close to your workplace (never on the monitor, under the keyboard or in similar places!)
Password-Manager: Consider using a password manager
Password change: Change your password immediately if you assume it was stolen