this post was submitted on 14 Sep 2025
116 points (99.2% liked)
Privacy
2487 readers
670 users here now
Icon base by Lorc under CC BY 3.0 with modifications to add a gradient
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Nothing prevents them from reading the messages prior to encryption or after decryption.
Well not nothing. Android apps are quite easy to reverse engineer so there would be a high risk of them getting caught which would be quite damaging for WhatsApp's brand.
I wouldn't say it's a lot, but it isn't nothing.
There is certainly nothing technical stopping them from doing it, but that's true of Signal too.
none of their users would care. but also good luck finding a news site that cares to write about it and has some reach
isn't signal built reproducibly, without obfuscation?
Not currently, but in theory that is better, true.
https://github.com/signalapp/Signal-Android/issues/13565
I was thinking about signal, and a fun fact is that if we invite all our friends and families to signal, then practically "none" of its users would care about such an incident either
https://faq.whatsapp.com/414631957536067/
Either the report function doesn't work like they say, or messages are stored decrypted, or they can decrypt messages at will based on a simple request from another user
Edit: fixed
I think I have to decrypt this url before I can open it
/edit: I did it! I was able to decrypt it!
https://faq.whatsapp.com/414631957536067/
This particular function is not at odds with E2EE. The client can either:
You're right, the messages would not be decrypted by the server but by the client making the report. Key rotation also shouldn't be an issue because it uses a ratcheting chain key. But if the non-malicious client is already set up to send decrypted messages to the server, this seems antithetical to the idea that WhatsApp can't read your conversations. There are clear caveats without even introducing the idea of a malicious client potentially exfiltrating decrypted messages elsewhere. Signal on the other hand receives the reported senders phone number and an encrypted message ID, presumably acting on spam reports by relying on multiple reports of the same message from the same sender, rather than by reading the message