Skip to main content

How to Bypass Whatsapp “Message Read” Confirmation

World’s most popular messaging service just got an update today which now sends a confirmation to the other person when a message is read in a conversation. The previously grey tickmarks now turn to blue as soon as a person reads the messages. We found a solution to bypass this! 

This is what the new Whatsapp tickmarks are all about :
Screen Shot 2014-11-06 at 12.21.15 pm
The social pressure to reply to a message might be greater if someone knows if you have actually read a message or not, making some people uncomfortable so instead of all that, we have found a simple solution to avoid making your tickmarks turning blue!
Here’s a trick you can follow to avoid whatsapp sending message read confirmation :

  1. When you receive a whatsapp message while you’re online or on your lock screen, don’t open it at first, let it get received with two grey tickmarks
  2. Switch off all your mobile internet and Wi-Fi
  3. Open whatsapp and read the conversation
  4. close the conversation, come back home and turn your Wi-Fi again


whatsapp read message confirmation bypassThat’s it. This will not send any message read confirmation to the other user and you’re not obliged to reply yet ;)

Comments

Popular posts from this blog

Beginning of Hacking

Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks. But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin? Late 1950s – The MIT Start Off with a Bang Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking go...

Internet of Threats!

T he Internet of Things (IoT) is continuing to gain traction with an ever-increasing number of connected devices coming to market. But as tech-savvy consumers begin investing in their first devices for a connected home, what is to stop them becoming a cyber attacker's next target? While still uncommon, we know that cyber attackers are going after connected consumer devices, demonstrated on a massive scale by the group of Russian hackers who published thousands of live-streaming webcam footage from over 250 countries. Unless the manufacturers of connected devices take a holistic approach to bolstering their cyber security efforts, these types of attacks will increase in number. To gain a greater understanding of the cyber security risks that consumers could be exposing themselves to, research was conducted into the cyber security posture of six ‘always-on’ consumer IoT devices. The results were unsettling. Veracode carried out a set of uniform tests across all the...

How to Build a Successful Incident Response Plan

The fight to protect your company’s data isn’t for the faint of heart. As an embattled IT warrior, with more systems, apps, and users to support than ever before, keeping everything up and running is a battle in itself. When it comes to preventing the worst-case scenario from happening, you need all the help you can get, despite your super-hero status. According to SANS, there are 6 key phases of an incident response plan. Preparation -  Preparing users and IT to handle potential incidents in case they happen Identification -  Figuring out what we mean by a “security incident” (which events can we ignore vs. which we must act on right now?) Containment -  Isolating affected systems to prevent further damage Eradication -  Finding and eliminating the root cause (removing affected systems from production) Recovery -  Permitting affected systems back into the production environment (and watching them closely) Lessons Learned -  Writing e...