Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Instagram lets you share Spotify songs with your story to your sound

June 30, 2025

At every stage of TechCrunch, Charles Hudson tells us what investors really see

June 30, 2025

Baidu’s AI Breakthrough Hasn’t Been Priced In — Why BIDU Could Hit $120 Soon

June 30, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Instagram lets you share Spotify songs with your story to your sound

    June 30, 2025

    The best iPad app to unleash and explore your creativity

    June 30, 2025

    Privacy-centric app maker Proton sues Apple over anti-competitive practices and charges alleged

    June 30, 2025

    Google is adopting AI in classrooms, including new Gemini tools for educators and chatbots for students

    June 30, 2025

    The former meta engineer has built AI tools to plan every detail of a trip

    June 30, 2025
  • Crypto

    Vitalik Buterin reserves for Sam Altman's global project

    June 28, 2025

    Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

    June 25, 2025

    Stablecoin Evangelist: Katie Haun's Battle of Digital Dollars

    June 22, 2025

    Hackers steal and destroy millions of Iran's biggest crypto exchanges

    June 18, 2025

    Unique, a new social media app

    June 17, 2025
  • Security

    US government overthrows North Korea's major “workers” management

    June 30, 2025

    Mexican drug cartel hackers spy on FBI officials' phones to track and kill informants, the report says

    June 30, 2025

    FBI, cybersecurity firms say prolific hacking crews are currently targeting airlines and transportation sectors

    June 28, 2025

    Prolific cybercrime gangs currently targeting the airline and transportation sector

    June 27, 2025

    US and French authorities confirm arrest of a violation form hacker

    June 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    At every stage of TechCrunch, Charles Hudson tells us what investors really see

    June 30, 2025

    From $5 to Financial Empowerment: Why Stash co-founder Brandon Krieg is a must-see for TechCrunch All Stage 2025

    June 30, 2025

    A comprehensive list of 2025 tech layoffs

    June 30, 2025

    How to prepare for a second semester salary increase now live in 2025

    June 30, 2025

    Tiffany is lucky to have won a VCS at TC at every stage.

    June 30, 2025
TechBrunchTechBrunch

X's new calling feature invades your privacy — here's how to turn it off

TechBrunchBy TechBrunchMarch 4, 20245 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


In his quest to turn the simple, functional Twitter app into X, an everything app that doesn't do anything well, Elon Musk launched voice and video calling in X last week — and this new feature. is turned on by default and leaked Your IP address can be known to anyone you talk to, making it very confusing to understand how to limit who can call you To do.

X's official news account posted on Wednesday, Announcing new features: “Voice and video calling is now available to everyone on X! Who will you call first?” wrote X.

We looked at X's official help center page, analyzed how the calling feature works, and ran tests on the feature to understand the risks associated with it.

Although a person's IP address is not very sensitive, these online identifiers can be used to infer location and can be linked to a person's online activities, which can be dangerous for high-risk users. .

First, the voice and video calling functionality is located within the Messages portion of the X app, with a phone icon in the top right corner on both iOS and Android.

Screenshot of X's audio and video calling features.

Screenshot of X audio and video calling features on iOS. Image credit: TechCrunch

Screenshot of X's audio and video calling features.

Screenshot of X audio and video calling features on Android. Image credit: TechCrunch

Calling is enabled by default in X apps. Please note that you can only make and receive calls in the X app, not in the browser yet.

By default, calls are peer-to-peer. This means that the two people on the call share each other's IP addresses, as the call connects directly to their own devices. As we reported in November, this happens by design in most messaging and calling apps, including FaceTime, Facebook Messenger, Telegram, Signal, and WhatsApp.

in Official help centerMr. X said calls are routed peer-to-peer between users in such a way that IP addresses “may be visible to the other party.”

If you want to hide your IP address, turn on the “Enhanced call privacy” toggle in X's Messages settings. When this setting is turned on, X says that calls will be “relayed through the X infrastructure, masking her IP address for callers who have this setting enabled.”

Screenshot of settings for audio and video calling features in X for iOS.

Screenshot of settings for audio and video calling features in X for iOS. Image credit: TechCrunch

Screenshot of settings for audio and video calling features in X for Android.

Screenshot of settings for audio and video calling features in X for Android. Image credit: TechCrunch

X doesn't mention encryption at all on its official help center page, so it's likely that the calls are not end-to-end encrypted and Twitter could potentially eavesdrop on the conversation. End-to-end encryption app, Signal or WhatsApp — Prevents anyone other than the caller and recipient from eavesdropping, including WhatsApp and Signal.

We asked X's press email if it has end-to-end encryption. The only response we got was “I'm busy right now, please check back later”, which is X's default automatic response to media inquiries. I sent an email to Joe Benarroch, a spokesperson for X, but did not receive a response.

Because of these privacy risks, we recommend that you turn off calling functionality completely.

If you want to use this calling feature, it's important to understand who can and can call you. Depending on your setup, it can get very confusing and complicated.

The default setting (as seen above) is “People I follow,” but you can also change it to “People in my address book” if you've shared your contacts with X. “Authenticated User”: Anyone who has paid for X can call you. If you want to receive spam calls from Rand, send them to everyone.

TechCrunch decided to test a few different scenarios using two X accounts: a newly created test account and a real account that has been around for many years. Using the open source network analysis tool Burp Suite, we were able to see the network traffic flowing into and out of the X app.

Here are the results (at the time of writing):

If both accounts follow each other, neither account will have a phone icon and neither will be able to make a call. When the test account sends a DM to the real account, the message is received, but neither account shows a phone icon. Once the real account accepts the DM, the test account can call the real account. If no one comes out, only her IP of the caller of the test account will be published. When the test account initiates a call and the real account answers (the real account's IP address is exposed, so both sets of IP addresses are exposed), the test account allows incoming “Follow” calls. It cannot be called back because it is set to . only. Once the real account follows back the test account, both will be able to contact each other.

Network analysis shows that X built the calling feature using Periscope, Twitter's live streaming service and app, which was discontinued in 2021. Because X's calls use his Periscope, network analysis shows that the X app is making the calls as if they were Twitter/X live broadcasts. Even if you can't hear the call.

Ultimately, it's your choice whether or not to use X calls. Since you can't do anything, you may be exposed to calls from people you probably don't want to receive calls, and your privacy may be violated. Alternatively, you can decipher X's settings to limit who can call you. Or you can just turn off this feature completely and you won't have to worry about anything.

Carly Page and Jagmeet Singh contributed reporting.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

US government overthrows North Korea's major “workers” management

June 30, 2025

Mexican drug cartel hackers spy on FBI officials' phones to track and kill informants, the report says

June 30, 2025

FBI, cybersecurity firms say prolific hacking crews are currently targeting airlines and transportation sectors

June 28, 2025

Prolific cybercrime gangs currently targeting the airline and transportation sector

June 27, 2025

US and French authorities confirm arrest of a violation form hacker

June 26, 2025

Homeland Security warns about Iran-backed cyberattacks targeting US networks

June 26, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Instagram lets you share Spotify songs with your story to your sound

June 30, 2025

At every stage of TechCrunch, Charles Hudson tells us what investors really see

June 30, 2025

Baidu’s AI Breakthrough Hasn’t Been Priced In — Why BIDU Could Hit $120 Soon

June 30, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.