imo will take technical measures to prevent
malicious software and network attacks,
including but not limited to encrypting
communication content, setting up firewalls,
and fixing security vulnerabilities, to ensure
that users are not harmed by malicious
software and network attacks when using imo.
Read blog:Can End To End Encryption Be Hacked