164 pointsby echelon_musk6 hours ago36 comments
  • martinralbrecht2 hours ago
    WhatsApp's end-to-end encryption has been independently investigated: https://kclpure.kcl.ac.uk/ws/files/324396471/whatsapp.pdf

    Full version here: https://eprint.iacr.org/2025/794.pdf

    We didn't review the entire source code, only the cryptographic core. That said, the main issue we found was that the WhatsApp servers ultimately decide who is and isn't in a particular chat. Dan Goodin wrote about it here: https://arstechnica.com/security/2025/05/whatsapp-provides-n...

    • some_furry2 hours ago
      Thank you for actually evaluating the technology as implemented instead of speculating wildly about what Facebook can do based on vibes.
  • 0x_rs3 hours ago
    It's a proprietary, closed-source application. It can do whatever it wants, and it doesn't even need to "backdoor" encryption when all it has to do is just forward everything matching some criteria to their servers (and by extension anyone they comply to). It's always one update away from dumping your entire chat history into a remote bucket, and it would still not be in contradiction with their promise of E2EE. Furthermore, it already has the functionality to send messages when reporting [0]. Facebook's Messenger also has worked that way for years. [1] There were also rumors the on-device scanning practice would be expanded to comply with surveillance proposals such as ChatControl a couple years ago. This doesn't mean it's spying on each and every message now, but it would have potential to do so and it would be feasible today more than ever before, hence the importance of software the average person can trust and isn't as easily subject to their government's tantrums about privacy.

    0. https://www.propublica.org/article/how-facebook-undermines-p...

    1. https://archive.is/fe6zY

    • paxys2 hours ago
      You are also using proprietary, closed-source hardware and operating system underneath the app that can do whatever they want. This line of reasoning ultimately leads to - unless you craft every atom and every bit yourself your data isn't secure. Which may be true, but is a pointless discussion.
      • threatofrain28 minutes ago
        No it means you calculate how much risk you're taking on, vendor by vendor. Do all companies have the same reputation before your eyes?
      • OutOfHerean hour ago
        That's a bad take because the vendors there are different; they're not Meta. As such, it's not pointless.
    • 2 hours ago
      undefined
  • cosmicgadget4 hours ago
    > “We look forward to moving forward with those claims and note WhatsApp’s denials have all been carefully worded in a way that stops short of denying the central allegation in the complaint – that Meta has the ability to read WhatsApp messages, regardless of its claims about end-to-end encryption.”

    My money is on the chats being end to end encrypted and separately uploaded to Facebook.

    • gruez3 hours ago
      >being end to end encrypted and separately uploaded to Facebook

      That's a cute loophole you thought up, but whatsapp's marketing is pretty unequivocal that they can't read your messages.

      >With end-to-end encryption on WhatsApp, your personal messages and calls are secured with a lock. Only you and the person you're talking to can read or listen to them, and no one else, not even WhatsApp

      https://www.whatsapp.com/

      That's not to say it's impossible that they are secretly uploading your messages, but the implication that they could be secretly doing so while not running afoul of their own claims because of cute word games, is outright false.

      • blibble3 hours ago
        > but whatsapp's marketing is pretty unequivocal that they can't read your messages.

        well that's alright then

        facebook's marketing and executives have always been completely above board and completely honest

        • gruez3 hours ago
          Read the rest of my comment?

          >That's not to say it's impossible that they are secretly uploading your messages, but the implication that they could be secretly doing so while not running afoul of their own claims because of cute word games, is outright false.

      • conscionan hour ago
        My guess is that they are end-to-end encrypted. And because of Facebook's scale that they're able to probabilisticly guess at what's in the encrypted messages (e.g.a message with X hash has Y probability of containing the word "shoes")
      • codyb2 hours ago
        The thing is, if they were uploading your messages, then they'd want to do something with the data.

        And humans aren't great at keeping secrets.

        So, if the claim is that there's a bunch of data, but everyone who is using it to great gain is completely and totally mum about it, and no one else has ever thought to question where certain inferences were coming from, and no employee ever questioned any API calls or database usage or traffic graph.

        Well, that's just about the best damn kept secret in town and I hope my messages are as safe!

        And I'm no fan of Meta...

        • 3eb7988a16632 hours ago
          Where were the Facebook whistleblowers about the numerous IOS/Android gaps that let the company gain more information than they were to supposed to see? Malicious VPNs, scanning other installed mobile applications, whatever. As far as I know, the big indictments have been found from the outside.
          • gruezan hour ago
            >Malicious VPNs

            AFAIK that was a separate app, and it was pretty clear that it was MITMing your connections. It's not any different than say, complaining about how there weren't any whistleblowers for fortinet (who sell enterprise firewalls).

            >scanning other installed mobile applications

            Source?

      • cosmicgadget3 hours ago
        Are messages and calls data at rest or data in motion? The UI lock feature refers to 'chats' which could be their term for data at rest.

        I wonder what the eula says.

      • netsharc3 hours ago
        I wonder if keyword/sentiment extraction on the user's device counts as reading "by WhatsApp"...

        There's the conspiracy theory about mentioning a product near the phone and then getting ads for it (which I don't believe), but I feel like I've mentioned products on WhatsApp chats with friends and then got an ad for them on Instagram sometime after.

        Also claiming "no one else can read it" is a bit brave, what if the user's phone has spyware that takes screenshots of WhatsApp... (Technically of course it's outside of their scope to protect against this, but try explaining that to a judge who sees their claim and the reality)

    • random34 hours ago
      That’s because they have such a good track record wrt to privacy? https://www.docketalarm.com/cases/California_Northern_Distri...
      • fn-mote3 hours ago
        That document is the dismissal of claims by an economist about Facebook’s privacy practices. I don’t see how it supports your argument.
    • matthewdgreen3 hours ago
      I really doubt this. Any such upload would be visible inside the WhatsApp application, which would make it the world's most exciting (and relatively straightforward) RE project. You can even start with a Java app, so it's extra easy.
      • cosmicgadget3 hours ago
        If you claim REing a flagship FAANG application is "extra easy", either they need to be laughed out of the room or you do.
        • gruezan hour ago
          Does FAANG apps have antidebug or code obfuscation? At least for google their apps are pretty lightly protected. The maximum extent of obfuscation is the standard compilation/optimization process that most apps go through (eg. r8 or proguard).
        • martinralbrecht2 hours ago
          Note that WhatsApp as a web client, too: https://eprint.iacr.org/2025/794
        • quesera3 hours ago
          Reverse engineering is easy when the source code is available. :)

          The difference between source code in a high-level language, and AArch64 machine language, is surmountable. The effort is made easier if you can focus on calls to the crypto and networking libraries.

          • cosmicgadget2 hours ago
            The source is available?

            Understanding program flow is very different from understanding the composition of data passing though the program.

            • queseraan hour ago
              At some level, the machine code is the source code -- but decompiling AArch64 mobile apps into something like Java is common practice.

              As GP alludes, you would be looking for a secondary pathway for message transmission. This would be difficult to hide in AArch64 code (from a skilled practitioner), and extra difficult in decompiled Java.

              It would be "easy" enough, and an enormous prize, for anyone in the field.

              • cosmicgadgetan hour ago
                I am familiar with disassembly and decompilation and what you just said is a huge handwave.

                > a secondary pathway for message transmission

                That's certainly the only way messages could be uploaded to Facebook!

                • queseraan hour ago
                  I'm curious why you think it's handwavy.

                  I've done this work on other mobile apps (not WhatsApp), and the work is not out of the ordinary.

                  It's difficult to hide subtleties in decompiled code. And anything that looks hairbally gets special attention, if the calling sites or side effects are interesting.

                  (edit for edit)

                  > That's certainly the only way messages could be uploaded to Facebook!

                  Well, there's a primary pathway which should be very obvious. And if there's a secondary pathway, it's probably for telemetry etc. If there are others, or if it isn't telemetry, you dig deeper.

                  All secrets are out in the open at that point. There are no black boxes in mobile app code.

                  • cosmicgadget43 minutes ago
                    > if there's a secondary pathway, it's probably for telemetry etc.

                    Seems like a good channel upon which to piggyback user data. Now all you have to do is obfuscate the serialization.

                    > It's difficult to hide subtleties in decompiled code.

                    Stripped, obfuscated code? Really? Are we assuming debug ability here?

                    > All secrets are out in the open at that point. There are no black boxes in mobile app code.

                    What about a loader with an encrypted binary that does a device attestation check?

    • varenc3 hours ago
      If this was happening en-masse, wouldn't this be discovered by the many people reverse engineering WhatsApp? Reverse engineering is hard sophisticated work, but given how popular WhatsApp is plenty of independent security researchers are doing it. I'm quite skeptical Meta could hide some malicious code in WhatsApp that's breaking the E2EE without it being discovered.
      • solenoid09373 hours ago
        It would be trivial to discover and would be pretty big news in the security community.

        I'd wager most of these comments are from nontechnical people, or technical people that are very far removed from security.

        • cosmicgadget2 hours ago
          I'm technical and work in security. Since it is trivial, please explain. Ideally not using a strawman like "well just run strings and look for uploadPlaintextChatsToServer()".
          • solenoid09372 hours ago
            I don't see why standard RE techniques (DBI/Frida + MITM) wouldn't work, do you?

            WhatsApp is constantly RE'd because it'd be incredibly valuable to discover gaps in its security posture, the community would find any exfil here.

            • cosmicgadget2 hours ago
              If people are trivially hooking IOS and Android applications then sure, it's just an exercise in dynamic analysis.

              Mobile applications are outside my domain so I am surprised platform security (SEL, attestation, etc.) has been so easily defeated.

            • martinralbrecht2 hours ago
              We did reverse engineer it and we're cryptographers not reverse engineering experts https://eprint.iacr.org/2025/794
              • 2 hours ago
                undefined
              • solenoid09372 hours ago
                Cool paper, thanks for sharing!
      • cosmicgadget3 hours ago
        Well they wouldn't be breaking e2ee, they'd be breaking the implicit promise of e2ee. The chats are still inaccessible to intermediaries, they'd just be stored elsewhere. Like Apple and Microsoft do.

        I am not familiar with the state of app RE. But between code obfuscators and the difficulty of distinguishing between 'normal' phone home data and user chats when doing static analysis... I'd say it's not out of the question.

      • palata2 hours ago
        Before that, Meta employees would know about it. Pretty convinced that someone would leak it.
    • steve_taylor3 hours ago
      > My money is on the chats being end to end encrypted and separately uploaded to Facebook.

      If governments of various countries have compelled Meta to provide a backdoor and also required non-disclosure (e.g. a TCN secretly issued to Meta under Australia's Assistance and Access Act), this is how I imagined they would do it. It technically doesn't break encryption as the receiving device receives the encrypted message.

    • guerrilla3 hours ago
      > My money is on the chats being end to end encrypted and separately uploaded to Facebook.

      This is what I've suspected for a long time. I bet that's it. They can already read both ends, no need to b0rk the encryption. It's just them doing their job to protect you from fourth parties, not from themselves.

    • FabHK2 hours ago
      It should be detectable if it sends twice the data.
  • Ms-J4 hours ago
    Who do they expect to fall for the claims that a Facebook owned messenger couldn't read your "encrypted" messages? It's truly funny.

    Any large scale provider with headquarters in the USA will be subject to backdoors and information sharing with the government when they want to read or know what you are doing.

    • olalonde4 hours ago
      Me? I'd be very surprised if they can actually read encrypted messages (without pushing a malicious client update). The odds that no one at Meta would blow the whistle seem low, and a backdoor would likely be discovered by independent security researchers.
      • nindalf3 hours ago
        I'd be surprised as well. I know people who've worked on the WhatsApp apps specifically for years. It feels highly unlikely that they wouldn't have come across this backdoor and they wouldn't have mentioned it to me.

        Happy to bet $100 that this lawsuit goes nowhere.

      • riazrizvi3 hours ago
        If there is such a back door, it would hardly follow it's widely known within the company. From the sparse reports on why Facebook/Meta has been caught doing this in the past, it's for favor trading and leverage at the highest levels.
      • SoftTalker3 hours ago
        That was my reaction on reading the headline. Of course Meta can read them, they own the entire stack. The question would really be do they?
      • Snoozus3 hours ago
        Is there an independent audit of the Whatsapp client and of the servers?
    • Aurornis4 hours ago
      > Any large scale provider with headquarters in the USA will be subject to backdoors and information sharing with the government when they want to read or know what you are doing.

      Not just the USA. This is basically universal.

      • j454 hours ago
        It's not guaranteed or by default.

        This type of generalized defeatism does more harm than not.

        • Aurornis4 hours ago
          > It's not guaranteed or by default.

          Nation state governments do have the ability to coerce companies within their territory by default.

          If you think this feature is unique to the USA, you are buying too much into a separate narrative. All countries can and will use the force of law to control companies within their borders when they see fit. The USA actually has more freedom and protections in this area than many countries, even though it’s far from perfect.

          > This type of generalized defeatism does more harm than not.

          Pointing out the realities of the world and how governments work isn’t defeatism.

          Believing that the USA is uniquely bad and closing your eyes to how other countries work is more harmful than helpful.

          • j452 hours ago
            Understanding the cloud is someone else's computer is something I've repeated many, many, many times in my comments.

            The OP assumption that it's just the way it is and everyone should accept their communication being compromised is the issue.

        • embedding-shape4 hours ago
          No, assuming that anything besides what you can verify yourself is compromised isn't "defeatism", although I'd agree that it's overkill in many cases.

          But for your data you want to absolutely keep secret? It's probably the only to guarantee someone else somewhere cannot see it, default to assume if it's remote, someone will eventually be able to access it. If not today, it'll be stored and decrypted later.

        • Ms-J3 hours ago
          This is correct. Yes, every government has the ability to use violence and coerce, but that takes coordination among other things. There are still places, and areas within those places, where enforcement and the ability to keep it secret is almost not possible.
      • ath3nd4 hours ago
        [dead]
    • huijzer4 hours ago
      I have reached the point that I think even the chat control discussion might be a distraction because essentially they can already get anything. Yeah government needs to fill in a form to request, but that’s mostly automated I believe
      • gruez3 hours ago
        >I have reached the point that I think even the chat control discussion might be a distraction because essentially they can already get anything.

        Then why are politicians wasting time and attracting ire attempting pushing it through? Same goes for UK demanding backdoors. If they already have it, why start a big public fight over it?

      • j454 hours ago
        Such initiatives are likely trying to make it easier.
    • mattmaroon4 hours ago
      I think you can safely remove “in the USA” from that sentence.
    • rdtsc4 hours ago
      > Any large scale provider with headquarters in the USA will be subject to backdoors

      Wonder what large scale provider outside USA won’t do that?

    • preisschild3 hours ago
      > Any large scale provider with headquarters in the USA will be subject to backdoors and information sharing with the government when they want to read or know what you are doing.

      Thats just wrong. Signal for example is headquartered in the US and does not even have this capability (besides metadata)

    • kgwxd4 hours ago
      They're only concerned someone at meta, they don't already control, could read their personal messages.
    • hsuduebc24 hours ago
      I do not believe them either. The swift start of the investigation by U.S. authorities only suggests there was no obstacle to opening one, not that nothing could be found. By “could not,” I mean it is not currently possible to confirm, not that there is necessarily nothing there.

      Personally, I would never trust anyone big enough that it(in this case Meta) need and want to be deeply entangled in politics.

  • codethief2 hours ago
    Matthew Green's take from 3 days ago:

    > There’s a lawsuit against WhatsApp making the rounds today, claiming that Meta has access to plaintext. I see nothing in there that’s compelling; the whole thing sounds like a fishing expedition.

    https://bsky.app/profile/matthewdgreen.bsky.social/post/3mdg...

  • youknownothing3 hours ago
    Just to throw in a couple of possibly outlandish theories:

    1. as others have said, they could be collecting the encrypted messages and then tried to decrypt them using quantum computing, the Chinese have been reportedly trying to do this for many years now.

    2. with metadata and all the information from other sources, they could infer what the conversation is about without the need to decrypt it: if I visit a page (Facebook cookies, they know), then I share a message to my friend John, and then John visits the same page (again, cookies), then they can be pretty certain that the contain of the message was me sharing the link.

    • solenoid09373 hours ago
      (1) made me chuckle. I've worked at nearly every FAANG including Meta. These companies aren't nearly as advanced or competent as you think.

      I no longer work at Meta, but in my mind a more likely scenario than (1) is: a senior engineer proposes a 'Decryption at Scale' framework solely to secure their E6 promo, and writes a 40-page Google Doc to farm 'direction' points for PSC. Five PMs repost this on Workplace to celebrate the "alignment" so they can also include it in their PSCs.

      The TL and PMs immediately abandon the project after ratings are locked because they already farmed the credit for it. The actual implementation gets assigned to an E4 bootcamp grad who is told by a non-technical EM to pivot 3 months in because it doesn't look like 'measurable impact' in a perf packet. The E4 gets fired to fill the layoff quota and everyone else sails off into the sunset.

    • wasabi9910113 hours ago
      Re. quantum computing: no chance, the scientific and engineering breakthroughs they would need are too outlandish, like claiming China already had a 2026-level frontier model back in 2016.
    • instagib2 hours ago
      2) enough metadata can reveal a person's life, habits, and location which removes the need to analyze the actual bulky content of communications.

      can analyze receivers data or receivers contact trees data which is easier to access.

      The number of free or paid data sources is daunting.

  • mrtksn5 hours ago
    I wonder how these investigations go? Are they just asking them if it is true? Are they working with IT specialist to technically analyze the apps? Are they requesting the source code that can be demonstrated to be the same one that runs on the user devices and then analyze that code?
    • RenThraysk4 hours ago
      Multiple governments will already know as they have analyzed and reverse engineered it.
    • mattmaroon4 hours ago
      That will be step 1. Fear of being caught lying to the government is such that that is usually enough. Presumably at least a handful of people would have to know about it, and nobody likes their job at Facebook enough to go to jail over it.

      But you never know.

      • hsuduebc24 hours ago
        Companies lie to governments and the public all the time. I doubt that even if something were found and the case were lost, it would lead to prison or any truly severe punishment. No money was stolen and no lives were put at risk. At worst, it would likely end in a fine, and then it would be forgotten, especially given Meta’s repeated violations of user trust.

        The reality is that most users do not seem to care. For many, WhatsApp is simply “free SMS,” tied to a phone number, so it feels familiar and easy to understand, and the broader implications are ignored.

        • mattmaroon3 hours ago
          Martha Stewart went to jail for lying to the government. The fact that there would be no punishment is why they would tell the truth.

          The government is pretty harsh when they find out you lied under oath. Corporate officers do not lie to the government frequently.

    • TZubiri4 hours ago
      Anyone can audit the client binaries
  • renegade-otter4 hours ago
    Anyone trusting Facebook to follow basic human decency and, yes, laws, is a fool.
    • xvector4 hours ago
      Anyone blindly believing every random allegation is also a fool, especially when the app in question has been thoroughly reverse engineered and you can freely check for yourself that it's using the same protocol as Signal for encryption
      • gherkinnn3 hours ago
        Allegations against a company who circumvented Android's security to track users?

        I don't have any proof that Meta stores WhatsApp messages but I feel it in my bones that at the very least tried to do so. And if ever that comes to light, precisely nobody will be surprised.

        https://cybersecuritynews.com/track-android-users-covertly/

        • gruezan hour ago
          >And if ever that comes to light, precisely nobody will be surprised.

          The amount of ambient cynicism on the internet basically makes this a meaningless statement. You could plausibly make the same claim for tons of other conspiracy theories, eg. JFK was assassinated by the CIA/FBI, Bush did 9/11, covid was intentionally engineered by the chinese/US government, etc.

      • jlarocco2 hours ago
        That raises the question of why not just use Signal and avoid a company whose founder thinks we're all "dumbfucks" and has a long history of scandals and privacy violations?

        The evidence is pretty clear that Facebook wants to do everything they legally can to track and monitor people, and they're perfectly okay crossing the line and going to court to find the boundaries.

        Using a company like that for encrypted messaging seems like an unnecessary risk. Maybe they're not decrypting it, but they're undoubtedly tracking everything else about the conversation because that's what they do.

    • Forgeties794 hours ago
      They got caught torrenting unbelievable amounts of content, an act that committed even just a few times can get my home Internet shut down with no recourse (best outcome). Literally nothing happened. Combine the fact that nothing legally significant ever happens to them with zuckerburg’s colossal ego and complete lack of ethical foundation, and you have quite the recipe.

      And I’m not even getting into the obvious negative social/political repercussions that have come directly from Facebook and their total lack of accountability/care. They make the world worse. Aside from the inconvenience for hobbyist communities and other groups, all of which should leave Facebook anyway, we would lose nothing of value if Facebook was shut down today. The world would get slightly better.

      • gruezan hour ago
        >an act that committed even just a few times can get my home Internet shut down with no recourse (best outcome).

        No, the best (and also most likely) outcome is you using a VPN and nothing happens, like 99.9% of pirates out there.

        >Literally nothing happened.

        Isn't there a lawsuit in the works?

      • bayarearefugee3 hours ago
        > Literally nothing happened.

        The true wealthy live by an entirely different set of rules than the rest of us, especially when they are willing to prostrate themselves to the US President.

        This has always been true to some degree, but is both more true than ever (there used to be some limits based on accepted decorum) plus they just dont even try to hide it anymore.

        • Forgeties793 hours ago
          I think the not hiding it part is what’s starting to stick in my craw. We all knew it was happening on some level, but we felt that there were at least some boundaries somewhere out there even if they were further than ours. Now it just feels like the federal government basically doesn’t exist and companies can do whatever they want to us.
  • solenoid09372 hours ago
    So many people that strongly believe WhatsApp isn't E2EE!

    Quick, someone set up a Kalshi or Polymarket or whatever claiming that WhatsApp isn't E2EE.

    I'll gladly bet against the total volume of people that believe it isn't E2EE -- it'll be an easy 2x for you or me.

  • londons_explore4 hours ago
    I want whatsapp to decrypt the messages in a secure enclave and render the message content to the screen with a secure rendering pipeline, as is done with DRM'ed video.

    Compromise of the client side application or OS shouldn't break the security model.

    This should be possible with current API's, since each message could if needed simply be a single frame DRM'ed video if no better approach exists (or until a better approach is built).

    • Retr0id4 hours ago
      Signal uses the DRM APIs to mitigate threats like Microsoft Recall, but it doesn't stop the app itself from reading its own data.

      I don't really see how it's possible to mitigate client compromise. You can decrypt stuff on a secure enclave but at some point the client has to pull it out and render it.

      • bogwog4 hours ago
        > I don't really see how it's possible to mitigate client compromise

        Easy: pass laws requiring chat providers to implement interoperability standards so that users can bring their own trusted clients. You're still at risk if your recipient is using a compromised client, but that's a problem that you have the power to solve, and it's much easier to convince someone to switch a secure client if they don't have to worry about losing their contacts.

        • palata2 hours ago
          > Easy: pass laws requiring chat providers to implement interoperability standards so that users can bring their own trusted clients.

          In Europe that's called the Digital Markets Act.

          • digiown2 hours ago
            That's not permissionless afaik. "Users" can't really do it. It's frustrating that all these legislations appear to view it as a business problem rather than a private individual's right to communicate securely.
        • xvector4 hours ago
          You seem to think the government wants your messages to be private and would "pass laws" to this effect.

          Methinks you put far too much faith in the government, at least from my understanding of the history of cybersecurity :)

      • londons_explore4 hours ago
        > don't really see how it's possible to mitigate client compromise.

        Think of the way DRM'ed video is played. If the media player application is compromised, the video data is still secure. Thats because the GPU does both the decryption and rendering, and will not let the application read it back.

        • gruez43 minutes ago
          That's not what signal's doing though. It's just asking the OS nicely to not capture screen contents. There are secure ways of doing media playback, but that's not what signal's using.
        • Retr0id3 hours ago
          Video decryption+decoding is a well-defined enough problem that you can ship silicon that does it. You can't do the same thing for the UI of a social media app.

          You could put the entire app within TrustZone, but then you're not trusting the app vendor any less than you were before.

          • Retr0id3 hours ago
            Although now I think about it more, you could have APIs for "decrypt this [text/image] with key $id, and render it as a secure overlay at coordinates ($x, $y)"
            • londons_explore3 hours ago
              Exactly. Thats how DRM video works, and I don't see why you couldn't do the same for text.
              • Retr0id2 hours ago
                Actual DRM uses symmetric keys though, figuring out how to do the crypto in an E2EE-comaptible way would be challenging.
        • pennomi3 hours ago
          There will always, ALWAYS be the analog hole in security models like this.
      • willis9364 hours ago
        By avoiding untrustworthy clients. All Windows devices should be considered compromised after last year.
        • Retr0id4 hours ago
          That's not mitigating client compromise, that's a whole other thing - trying to construct an uncompromiseable client.

          You don't build defense-in-depth by assuming something can't be compromised.

          • willis9364 hours ago
            Clients can always be compromised. I'm not talking about a client that can't be compromised, but simply a client that is not compromised out-of-the-box.
            • Retr0id4 hours ago
              That seems orthogonal to the subject of this discussion, i.e. "Compromise of the client side application or OS shouldn't break the security model."
        • cobertos4 hours ago
          Windows has been sending usage history back to their servers for longer than just last year
        • GraemeMeyer4 hours ago
          Why last year?
          • willis9364 hours ago
            Windows recall, intrusive addition of AI features (is there even a pinky promise that they're not training on user data?), more builtin ads, and less user control (most notably the removal of using the OS without an account - something that makes sense in the context of undisclosed theft of private information).

            This was 2025. I'm excited for what 2026 will bring. Things are moving fast indeed.

      • HumblyTossed4 hours ago
        This. The gap in E2E is the point at which I type in clear text and the point at which I read clear text. Those can be exploited.
    • rsyncan hour ago
      “I want whatsapp to decrypt the messages in a secure enclave and render the message content to the screen with a secure rendering pipeline, as is done with DRM'ed video.“

      If you are sophisticated enough to understand, and want, these things (and I believe that you are) …

      … then why would you want to use WhatsApp in the first place?

    • OtherShrezzing4 hours ago
      This is what a layman would assume happens from Meta’s WhatsApp advertising. They show the e2e process, and have the message entirely unreadable by anyone but the phone owner.
      • kevin_thibedeau4 hours ago
        e2e means unreadable by a middleman. That is a small inconvenience if you can readily compromise an endpoint.
        • Almondsetat4 hours ago
          People keep talking about e2ee as if it was some brain-to-brain encoding that truly allowed only the recipient person to decrypt the message
          • dijit4 hours ago
            because it used to be that the ends and the middlemen were different entities.

            In the universe where they are the same entity (walled-gardens) there is only the middleman.

            In such cases you either trust them or you don’t, anything more is not required because they can compromise their own endpoints in a way you can not detect.

  • hiprob3 hours ago
    I know the default assumption with Telegram is that they can read all your messages, but unlike WhatsApp they seem less cooperative and I never got the notion that they ever read private messages until the Macron incident, and even then they do if the other party reports them. How come they are able to be this exception despite not having end to end encryption by default?
  • lukeschlather3 hours ago
    It seems obvious that they can. It's my understanding for FB Messenger that the private key is stored encrypted with a key that is derived from the user's password. So it's not straightforward, but Meta is obviously in a position to grab the user's password when they authenticate and obtain their private key. This would probably leave traces, but someone working with company authorization could probably do it.

    For WhatsApp they claim it is like Signal, with the caveat that if you have backups enabled it works like Messenger. Although interestingly if you have backups enabled the key may be stored with Apple/Google rather than Meta, it might be the case that with backup enabled your phone vendor can read your WhatsApp messages but Facebook cannot.

  • ohcmon3 hours ago
    Next time you use true real independently audited e2e communication channel, don’t forget to check who is the authority who says that the "other end" is "the end" you think it is
  • miohtama4 hours ago
    Both things cannot be true at the same time

    - WhatsApp encryption is broken

    - EU's and UK's Chat Control spooks demand Meta to insert backdoor because they cannot break the encryption

    The Guardian has its own editorial flavour on tech news, so expect them to use any excuse to bash the subject.

    • Retric4 hours ago
      Just because Adam has a back door doesn’t mean Eve also has a back door.
    • preisschild3 hours ago
      > EU's and UK's Chat Control spooks demand Meta to insert backdoor because they cannot break the encryption

      Those are not law, so no the EU doesnt demand that

    • dyauspitr4 hours ago
      They’re just not sharing the back door with the EU?
  • OutOfHere42 minutes ago
    The issue here is that WhatsApp doesn't work with third-party clients (outside of EU anyway). It does now in EU via BirdyChat and Haiket, but the features are too limiting: https://about.fb.com/news/2025/11/messaging-interoperability...

    Ideally, WhatsApp would fully support third-party open-source clients that can ensure that the mathematics are used as intended.

  • modeless3 hours ago
    Meanwhile Apple has always been able to read encrypted iMessage messages and everyone decided to ignore that fact. https://james.darpinian.com/blog/apple-imessage-encryption
    • Flere-Imsaho3 hours ago
      And it's worse if you live in the UK:

      https://support.apple.com/en-us/122234

      In fact on this page they still claim iMessage is end-to-end encrypted.

    • razingeden3 hours ago
      I remember reading this recently. Not saying it’s true but it got my attention

      TUESDAY, NOVEMBER 25, 2025 Blind Item #7 The celebrity CEO says his new chat system is so secure that even he can't read the messages. He is lying. He reads them all the time.

    • gruez3 hours ago
      >has always been able to read encrypted iMessage messages

      ...assuming you have icloud backups enabled, which is... totally expected? What's next, complaining about bitlocker being backdoored because microsoft can read your onedrive files?

      • modeless3 hours ago
        If you read the link you would know that contrary to your expectation other apps advertising E2EE such as Google's Messages app don't allow the app maker to read your messages from your backups. And turning off backups doesn't help when everyone else has them enabled. Apple doesn't respect your backup settings on other people's accounts. Again, other apps address this problem in various ways, but not iMessage.
        • 3 hours ago
          undefined
        • gruez3 hours ago
          >If you read the link you would know that contrary to your expectation other apps advertising E2EE don't allow the app maker to read your messages.

          What does that even mean? Suppose icloud backups doesn't exist, but you could still take screenshots and save them to icloud drive. Is that also "Apple has always been able to read encrypted iMessage messages"? Same goes for "other people having icloud backups enabled". People can also snitch on you, or get their phones seized. I feel like people like you and the article author are just redefining the threat model of E2EE apps just so they can smugly go "well ackshually..."

          • modeless3 hours ago
            It means, for example, Google Messages uses E2EE backups. Google cannot read your E2EE messages by default, period. Not from your own backup, not from other peoples' backups. No backup loophole. Most other E2EE messaging apps also do not have a backup loophole like iMessage.

            It's not hard to understand why Apple uploading every message to themselves to read by default is different from somebody intentionally taking a screenshot of their own phone.

            • gruez41 minutes ago
              >Google cannot read your E2EE messages by default, period.

              Is icloud backups opt in or opt out? If it's opt in then would your objection still hold?

      • Snoozus3 hours ago
        Absolutly, they intentionally make stuff sound secure and private while keeping full access.
  • vbezhenar3 hours ago
    Whatsapp is considered insecure and banned from use for military in Russia. Telegram, on the other hand, is widely used. Of course that's not something definitive, but just a food for thought.
    • gruez3 hours ago
      > but just a food for thought.

      ...that telegram is backdoored by the russians? The implication you're trying to make seems to be that russians must be choosing telegram because it's secure, but are ignoring the possibility that they're choosing telegram because they have access to it. After all, you think they want the possibility of their military scheming against them?

      • p1anecrazyan hour ago
        I guess their point was that Russian military doesn‘t care if Russian intelligence reads their messages
        • gruez41 minutes ago
          Maybe OP should clearly state their thesis rather than beating around the bush with "... just a food for thought", so we don't have to guess what he's trying to say.
  • david_allison4 hours ago
    It was my understanding that the backups are unencrypted. Is that still the case?
    • evanjrowley4 hours ago
      On Android, if you allow it to backup to your Google cloud storage, it will say the backups are encrypted. That was my experience when I set it up a few weeks ago.

      Exactly who has the ability to decrypt the backup is not totally clear.

      It may be a different situation for non-Android users, Android users who are not signed in with a Google account, Android users who are not using Google Play Services, etc.

      • bayindirh4 hours ago
        You can explore your Google Cloud's Application Storage part via Rsync, AFAIK. So you can see whether your backups are encrypted or not.

        I remember that you had to extract at least two keys from the android device to be able to read "on-device" chat storage in the days of yore, so the tech is there.

        If you don't have the keys' copies in the Google Drive side, we can say that they are at least "superficially" encrypted.

  • oefrha4 hours ago
    I always assumed Meta has backdoor that at least allows them to compromise key individuals if men in black ask, but law firm representing NSO courageously defending the people? Come the fuck on.

    > Our colleagues’ defence of NSO on appeal has nothing to do with the facts disclosed to us and which form the basis of the lawsuit we brought for worldwide WhatsApp users.

    • zugi3 hours ago
      > I always assumed Meta has backdoor that at least allows them to compromise key individuals if men in black ask

      According to Meta's own voluntarily published official statements, they do not.

      * FAQ on encryption: https://faq.whatsapp.com/820124435853543

      * FAQ for law enforcement: https://faq.whatsapp.com/444002211197967

      These representations are legally binding. If Meta were intentionally lying on these, it would invite billions of dollars of liability. They use similar terminology as Signal and the best private VPN companies: we can't read and don't retain message content, so law enforcement can't ask for it. They do keep some "meta" information and will provide it with a valid subpoenoa.

      The latter link even clarifies Meta's interpretation of their responsibilities under "National Security Letters", which the US Government has tried to use to circumvent 4th amendment protections in the past:

      > We interpret the national security letter provision as applied to WhatsApp to require the production of only two categories of information: name and length of service.

      I guess we'll see if this lawsuit goes anywhere or discovery reveals anything surprising.

  • calibas4 hours ago
    It's vulnerable to man-in-the-middle attacks, and the man-in-the-middle happens to be Meta.

    The tricky part would be doing it and not getting caught though.

  • SirFatty3 hours ago
    Of course they can. Why wouldn't you assume this to be the case?
  • nindalf3 hours ago
    This reads like a nothingburger. Couple of quotes from the article:

    > the idea that WhatsApp can selectively and retroactively access the content of [end-to-end encrypted] individual chats is a mathematical impossibility

    > Steven Murdoch, professor of security engineering at UCL, said the lawsuit was “a bit strange”. “It seems to be going mostly on whistleblowers, and we don’t know much about them or their credibility,” he said. “I would be very surprised if what they are claiming is actually true.”

    No one apart from the firm filing the lawsuit is actually supporting this claim. A lot of people in this thread seem very confident that it's true, and I'm not sure what precisely makes them so confident.

    • Snoozus3 hours ago
      I find this wording also "a bit strange".

      It is not a mathematical impossibility in any way.

      For example they might be able to read the backups, the keys might be somehow (accidentaly or not) leaked...

      And then the part about Telegram not having end2end encryption? What's this all about?

      • FabHK3 hours ago
        Telegram defaults to not e2ee; you have to initiate a "secret" chat to get e2ee.
  • timpera3 hours ago
    Lots of uninformed conspiratorial comments with zero proof in here, but I'd really like WhatsApp to get their encryption audited by a reliable, independent 3rd party.
    • 3 hours ago
      undefined
  • rambojohnsonan hour ago
    I mean no shit, right?
  • mlmonkey2 hours ago
    I'm shocked, shocked! that there's gambling going on here ...
  • znpy4 hours ago
    I always assumed this to be true, to be honest.

    Nowadays all of the messaging pipeline on my phone is closed source and proprietary, and thus unverifiable at all.

    The iPhone operating system is closed, the runtime is closed, the whatsapp client is closed, the protocol is closed… hard to believe any claim.

    And i know that somebody’s gonna bring up the alleged e2e encryption… a client in control of somebody else might just leak the encryption keys from one end of the chat.

    Closed systems that do not support third party clients that connect through open protocols should ALWAYS be assumed to be insecure.

    • gruez37 minutes ago
      >Closed systems that do not support third party clients that connect through open protocols should ALWAYS be assumed to be insecure.

      So you're posting this from an open core CPU running on an open FPGA that you fabricated yourself, right? Or is this just a game of one-upmanship where people come with increasingly high standards for what counts as "secure" to signal how devoted to security they are?

    • solenoid09373 hours ago
      it doesn't need to be open source for us to know what it's doing. its properties are well understood by the security community because it's been RE'd.

      > a client in control of somebody else might just leak the encryption keys from one end of the chat.

      has nothing to do with closed/open source. preventing this requires remote attestation. i don't know of any messaging app out there that really does this, closed or open source.

      also, ironically remote attestation is the antithesis of open source.

  • cftan hour ago
    I trust Telegram more: Putin never had any problems with Whatsapp, only with Telegram.
  • oldestofsports4 hours ago
    Surprised pikachu face
  • josefrichter4 hours ago
    I am not into conspiracy theories, but I find it very unlikely that our governments can’t read all our messages across platforms.
  • AndrewKemendo4 hours ago
    If your personal threat model at this point is not literally:

    “everything I ever do can be used against me in court”

    …then you are not up-to-date with the latest state of society

    Privacy is the most relevant when you are in a position where that information is the difference between your life or your death

    The average person going through their average day breaks dozens of laws because the world is a Kafkaesque surveillance capitalist society.

    The amount of information that exists about there average consumer is so unbelievably godly such that any litigator could make an argument against nearly any human on the planet that they are in violation of something if there is enough pressure

    If you think you’re safe in this society because you “don’t do anything wrong“ then you’re compromised and don’t even realize it

  • jijji4 hours ago
    if anybody believes that Facebook would allow people to send a totally encrypted message to somebody, they're out of their mind. they're pretty much in bed with law enforcement at this point. I mean I don't know how many people have been killed in Saudi Arabia this year for writing Facebook messages to each other that were against what the government wanted but it's probably a large number.
    • xvector3 hours ago
      This reads like another low effort conspiratorial comment.

      WhatsApp has been reverse engineered extensively, they worked with Moxie's team to implement the same protocol as Signal, and you can freely inspect the client binaries yourself!

      If you're confident this is the case, you should provide a comment with actual technical substance backing your claims.

  • alex11384 hours ago
    Zuck didn't buy it in good faith. It wasn't "we'll grow you big by using our resources but be absolutely faithful to the privacy terms you dictate". Evidence: Brian Acton very publically telling people that they (Zuck, possibly Sandberg) reneged

    Zuck thinks we're "dumb fucks". That's his internet legacy. Copying products, buying them up, wiping out competition

  • ralusek5 hours ago
    I mean at the very least if their clients can read it then they can at least read it through their clients, right? And if their clients can read it’ll be because of some private key stored on the client device that they must be able to access, so they could always get that. And this is just assuming that they’ve been transparent about how it’s built, they could just have backdoors on their end.
    • basch5 hours ago
      they can also just .. brute force passwords. the pin to encrypt fb messenger chat is 6 digits for example.
      • farbklang4 hours ago
        but that is a pin and can be rate limited / denied, not a cryptograhpic key that can be used to brute force and compare hash generations (?)
        • barbazoo4 hours ago
          They likely wouldn’t rate limit themselves, rate limiting only applies when you access through their cute little enter your pin UI.
          • solenoid09373 hours ago
            The PIN is used when you're too lazy to set an alphanumeric pin or offload the backup to Apple/Google. Now sure, this is most people, but such are the foibles of E2EE - getting E2EE "right" (eg supporting account recovery) requires people to memorize a complex password.

            The PIN interface is also an HSM on the backend. The HSM performs the rate limiting. So they'd need a backdoor'd HSM.

            • barbazoo2 hours ago
              That added some context I didn’t have yet thanks. I’m not seeing yet how Meta if it was a bad actor wouldn’t be able to brute force the pin of a particular user. Of this was a black box user terminal site, Meta owns the stack here though, seems plausible that you could inject yourself easily somewhere.
              • solenoid09372 hours ago
                If you choose an alphanumeric pin they can't brute force because of the sheer entropy (and because the key is derived from the alphanumeric PIN itself.)

                However, most users can't be bothered to choose such a PIN. In this case they choose a 4 or 6 digit pin.

                To mitigate the risk of brute force, the PIN is rate limited by an HSM. The HSM, if it works correctly, should delete the encryption key if too many attempts are used.

                Now sure, Meta could insert itself between the client and HSM and MITM to extract the PIN.

                But this isn't a Meta specific gap, it's the problem with any E2EE system that doesn't require users to memorize a master password.

                I helped design E2EE systems for a big tech company and the unsatisfying answer is that there is no such thing as "user friendly" E2EE. The company can always modify the client, or insert themselves in the key discovery process, etc. There are solutions to this (decentralized app stores and open source protocols, public key servers) but none usable by the average person.

            • basch3 hours ago
              That might be a different pin? Messenger requires a pin to be able to access encrypted chat.

              Every time you sign in to the web interface or resign into the app you enter it. I don’t remember an option for an alphanumeric pin or to offload it to a third party.

              • solenoid09372 hours ago
                Oh my bad! I was talking about WhatsApp.

                The Messenger PIN is rate limited by an HSM, you merely enter it through the web interface.

                Of course, the HSM could be backdoored or the client could exfil the secret but the latter would be easy to discover.

                Harder to do any better here without making the user memorize a master password, which tends to fail miserably in real life.

        • 3 hours ago
          undefined
  • xvector4 hours ago
    What even are these low effort, uninformed conspiratorial comments saturating the comment section?

    Sure, Meta can obviously read encrypted messages in certain scenarios:

    - you report a chat (you're just uploading the plaintext)

    - you turn on their AI bot (inference runs on their GPUs)

    Otherwise they cannot read anything. The app uses the same encryption protocol as Signal and it's been extensively reverse engineered. Hell, they worked with Moxie's team to get this done (https://signal.org/blog/whatsapp-complete/).

    The burden of proof is on anyone that claims Meta bypassing encryption is "obviously the case."

    I am really tired of HN devolving into angry uninformed hot takes and quips.

  • oncallthrow3 hours ago
    This should surprise nobody. Do you really think that the intelligence agencies of the US etc would allow mainstream E2E encryption? Please stop being so naive
  • kachapopopow4 hours ago
    yes, this is a very known fact that it is not E2EE but Client2Server Encrypted. Otherwise your message history wouldn't work.
    • codexetreme4 hours ago
      Might be a rookie question. But exactly why would chat history not work?
      • ryanscio3 hours ago
        It would, just not on new devices without moving keys via already-trusted device. This is what WhatsApp presumably does
    • xvector4 hours ago
      This is a total misunderstanding of how E2EE works.

      I need to either enter my password or let the app access my iCloud Keychain to let it derive the backup encryption key.

      It's also well known that they worked with the Moxie's team to implement the same E2EE protocol as Signal. So messages are E2EE as well.