For open source messengers, you can check whether they actually encrypt your messages and whether the server has access to your encryption keys but what about WhatsApp? Since it’s not open source, you can’t be sure that the encryption keys aren’t sent to the server, right? Has there been a case where a government was able to access WhatsApp chats without reading them from the phone itself?
Facebook owns what’s app and they can read any message on the service, they’ve also been known to give logs and messages to law enforcement agencies at request without warrants.
Why is it legal for them to advertise it as end-to-end encrypted then? I thought the main danger lies in WhatsApp insistence on backing up non-encrypted history to Google Drive/iCloud.
Of course, the existence of backdoors is usually not disclosed (duh), but can they actually read any message?
Why is it legal for them to advertise it as end-to-end encrypted then?
Because they are a multi-billion dollar company.
You can have end to end encryption over the wire and still have all of your shit harvested at the “endpoints”
It really sucks how a shit ton of money gives a company the ability to do anything they want and avoid legal consequences almost all of the time. It’s a corrupt society we live in.
EU usually frowns upon that though. Sure, the fines are so small that it’s negligible for Meta, but there should be some fines. But all I find via quick googling are this year’s sanctions over personal data processing in Facebook/Instagram/WhatsApp. The nature of these data is not clear though.
I am not trying to say that WhatsApp is safe to use, mind you. I am pretty sure they will hand over all the info along with encryption keys at first government’s request (or any other highest bidder for that matter), but that’s only my perception of them as a company, with no hard proof at hand.
The EU has been trying to outlaw encryption for most of this year.
“The EU” isn’t one singular person or party or state or whatever. There are some people who are trying to outlaw it but that doesn’t mean that they’re the majority or that it’s even legal to do.
It’s not illegal because it is end to end encrypted when you send messages, but it’s not encrypted on your phone and they have access to that, not to mention, I imagine they have access to the keys used to encrypt the messages, so even if they backed it up encrypted they can still read the messages.
The point of implementing it is not to protect people from surveillance, but rather to make people think they’re protected so they’ll keep using the platform rather than moving to another service. Their actual claims about it amount to “If your on public Wi-Fi or something, people skimming that won’t be able to see your messages” which is absurd because they already couldn’t.
Admittedly, no law enforcement that they refuse to cooperate with will have access to the messages, but like, “law enforcement groups Facebook doesn’t cooperate with” is a very small list.
I believe this is down to what they define as being end to end encrypted.
It’s no secret that WhatsApp adopted Signal’s encryption protocol just before Meta acquired them, but since it’s all closed source we don’t know if they’ve changed anything since the announcement in 2016 that all forms of communications on WhatsApp are now encrypted and rolled out.
Within WhatsApp’s privacy policy, it’s important to note that they only mention end to end encryption when it comes to your messages. Everything else is apparently “fair game” for collection. Of note, the Usage and Log information point details all the metadata they collect on you automatically, including how you use the service; how long you use the service; your profile info; the groups you’re in; whether you’re online; and the last time you were online, to name a few things.
I guess what I’m trying to say is that technically they are end to end encrypted by definition, and whilst they’ve gone ahead and implemented things such as encrypted backups (that you must enable) to make it harder for them to read your message contents, they can still collect a lot of metadata on every user.
It’s no secret that WhatsApp adopted Signal’s encryption protocol just before Meta acquired them, but since it’s all closed source we don’t know if they’ve changed anything since the announcement in 2016 that all forms of communications on WhatsApp are now encrypted and rolled out.
There is an Open Source implementation of the WhatsApp protocol: yowsup
I’ve not seen this before. This is really neat! Thanks for sharing ❤️
And the metadata is enough to get convictions. A person was convicted back in 2019 or so based on the metadata of her whatsapp conversation with a reporter. Natalie something, I think.
It wouldn’t surprise me if WhatsApp’s model on this is what the UK government were thinking of with the Online Safety Bill when they tried to enforce a back door in encrypted messengers.
It’s incredible just how much more interesting metadata can be than the actual message contents.
Explaining this to people when they ask why I don’t use WhatsApp is pretty difficult though.
I wouldn’t feel comfortable if I found out that what I thought was just a casual walk down the street mindlessly chatting with a friend turned out to also involve a third party neither of us were aware of tracking all of our movements.
It’s very obvious to me that GBoard sends data directly to Google circumventing all encryption.
👆👆👆👆👆👆 Came looking for this one. Because somehow Joe Average ends up with keyboards having “added value” like Giphy (from Meta) integration and online spell checkers because local dictionaries are to oldskool.
This is just completely wrong. If you read past the misleading headline here:
https://nypost.com/2021/09/07/facebook-reads-and-shares-whatsapp-private-messages-report/
You’ll see that Facebook cannot, in fact, give logs to law enforcement. If you choose to report a message you’ve received and send it to Facebook, then obviously then they can read it.
Also, your claim in another comment that Facebook does not have private keys to decrypt your encrypted messages is just fantasy.
According to the declassified internal FBI document I just linked, they do have access to the content of messages from what’s app, without any formal legal request.
The NY post is a poor source and completely unreliable.
declassified internal FBI document I just linked
don’t see any such link
There’s no such link in their comment history either.
You bet your ass they can. Since when has Facebook taken anybody’s privacy seriously? And you remember all the Snowden leaks? Like how AT&T has been a government apparatus for spying for decades? Or how about the way that the USA taps under sea cables to monitor data, causing China to build totally parallel backbone infrastructure
The better question is whether Signal, despite being open source, is actually secure. It’s very plausible that the govt has backdoors somewhere, for either encryption, the OS, the programming language, the app store, or some random dependency lib
The answer is yes, the US government spies on everything, and has a complete profile of everyone
Signal hasn’t been compromised. It has been reviewed and is continuing to be reviewed by tons of researchers and security personnel.
Its also important to note that its used internally by goverment organizations in the US so it has to be at least reasonably secure.
Don’t believe propaganda you read online.
Well, in my comment I describe quite a number of methods. It doesn’t matter how secure or reviewed signal is, if the feds have a keylogger at the OS or compiler level. It’s really unbelievable how much code is involved in day to day security
The keylogger and operating system (if you’re using Android) is open source as well. They can’t just put a keylogger in there.
Time to bet my ass
Well you gotta be careful if it’s your only donkey but I’m still confident you’ll end up winning a second ass
Probably not, but it’s impossible to verify. There’s a strong argument for open source when security really matters.
I think there is a strong argument for Foss for anything
Another thing to consider is that the US (and probably most 5 eyes countries) have agencies with a “store now and decrypt later” policy. They theoretically could be capturing certain types of traffic and storing it in the massive NSA fusion centers. If you come under suspicion at some later date and the quantum technology has advanced, you could be hosed. Now what’s the legality of storing “precrime material” without a warrant? I wouldn’t think it is legal but that doesn’t seem to stop the 3 letter agencies these days.
They don’t have to attack the encryption, there are far easier ways. Compromising your phone then reading the notification contents for example. If a smallish company can do this (pegasus) imagine what the resources of the US intelligence complex can do.
The easiest way by far is to intimidate you to give up your phone password and hand over the messages.
XKCD for refference: https://xkcd.com/538/
Shouldn’t the phone disk be encrypted too?
Doesn’t matter if the phone is compromised while turned on.
Given enough time anything can be decrypted, so, yes. The actual question is if they would have any interest in doing so given the large investment of time and resources required when they can simply hit you with a wrench until you give them the password to your device or in more enlightened Countries, just buy the data directly form Meta. You don’t control the server so there is no assurance of any encryption being secure beyond your chat not being interesting enough to justify the attention.
https://link.springer.com/chapter/10.1007/978-3-031-38551-3_11
Dated August 2023.
expired
Its a book of proceedings of a scientific conference, usually peer-reviewed. Springer publishes the proceedings but has nothing to do with the selection of the papers or their scientific quality… its just a service they provide, for a fee.
expired
If you did not enable end-to-end encryption for your WhatsApp backups on Google Drive, the US government could possibly compel Google to hand over your encrypted (but not end-to-end encrypted) backup, and compel Meta to hand over the decryption keys for the backup.
Details about how WhatsApp backup works: The Workings of WhatsApp’s Backups (and Why You Should Enable End-to-End Encrypted Backups).
I know that WhatsApp backups aren’t safe and I never turned them on
Everything I’ve ever heard about government cryptography from people close to me is that the government (FBI, military) is wildly far ahead of what’s available publicly. I wouldn’t count on anything you do on the Internet to be truly private.
That was at times of DES. Cryptography that is used today is proven to be complicated enough that it’s unbreakable unless the government got quantum computing working at sufficient skale.
Like others wrote, attacks will happen when the messages are received and decrypted.
People got arrested for WhatsApp messages in my country so there is a backdoor built in no question
That’s mostly group chats and someone from the group showed the comments to the police.
Dunno
No. They cant decrypt your chats. They can however backdoor your device and see the pre or post delivery message.
If they arent currently logging activity on your device then turning on self destruct messaging could mitigate their ability to spy on you. Unfortunately all your chat partners have to do it too.
Removed by mod
Group chats are also end-to-end encrypted in WhatsApp (so any monitoring would need to be done in cooperation with one of the participants’ devices before encryption or after decryption)
Removed by mod
In a subpoena case in India, that turned out to be not true.
Source please.
WhatsApp admins hold keys to being able to do that under law pressure.
How do they get the keys?
They only guarantee it for 1-1 messages and statuses, and against “generic” actors for group chats…
Who is “they”?
Yeah… I see no reference to this anywhere… some stuff in 2021 about WhatsApp protesting privacy law changes in India and some stuff about the liability of Group Admins for things posted in groups. Nothing about broken encryption measures.
I can only assume they are referring to WhatsApp Group Admins, who are inherently part of the group, as opposed to WhatsApp company admins.
Removed by mod
yowsup is an Open Source implementation of the WhatsApp protocol. So there is proper end-to-end encryption on the protocol level - that would only leave the possibility of having a backdoor in the “official” WhatsApp client, but none has been found so far. BTW, people do actually (try to) decompile the WhatsApp client (or the WhatsApp Web client which implements the same protocol and functionality) and look what it is doing.
For anyone really curious, it’s not too difficult to hook into the WhatsApp Web client with your web browsers Javascript debugger and see what messages are sent.
That repo was updated two years ago, everything could have happened within that time.
It still works (with a few minor updates).
I wouldn’t recommended using old software if you care about security
Maybe so, but in this case the point was that the protocol used by WhatsApp hasn’t changed in that time and it’s still what they describe in their security whitepaper. If you want to use that software as is or maybe reimplement it based on that is up to you.
Open source can make it easier to audit software, but we’re long past the point where we can’t audit unfree and/or closed source software. Open source is great and important, but the debate around open source regarding trust and security is often a sideshow.
If 1. all participating devices are sufficiently secure and will be sufficiently secure in the future, 2. no participating device backs up your conversations to the cloud or only does so in a sufficiently encrypted manner, and 3. no participating user leaks your information in any other way, then yes, the general expectation is that your WhatsApp chats with people are encrypted. Keep in mind that defaults, nudges, and people work against you in this long list of requirements.
Oh, and… more importantly… metadata. But that’s a separate issue. WhatsApp’s encryption claim could be entirely true, but still work against user privacy, simply because those conditions are almost never true …and also, again, meta data.
Users conscientious enough to consistently meet all of these requirements could simply use a platform deemed less hostile to user privacy, such as Matrix or Signal.