this post was submitted on 27 Jan 2026
817 points (99.6% liked)

Technology

79355 readers
4180 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

As evidence, the lawsuit cites unnamed "courageous whistleblowers" who allege that WhatsApp and Meta employees can request to view a user's messages through a simple process, thus bypassing the app's end-to-end encryption. "A worker need only send a 'task' (i.e., request via Meta's internal system) to a Meta engineer with an explanation that they need access to WhatsApp messages for their job," the lawsuit claims. "The Meta engineering team will then grant access -- often without any scrutiny at all -- and the worker's workstation will then have a new window or widget available that can pull up any WhatsApp user's messages based on the user's User ID number, which is unique to a user but identical across all Meta products."

"Once the Meta worker has this access, they can read users' messages by opening the widget; no separate decryption step is required," the 51-page complaint adds. "The WhatsApp messages appear in widgets commingled with widgets containing messages from unencrypted sources. Messages appear almost as soon as they are communicated -- essentially, in real-time. Moreover, access is unlimited in temporal scope, with Meta workers able to access messages from the time users first activated their accounts, including those messages users believe they have deleted." The lawsuit does not provide any technical details to back up the rather sensational claims.

you are viewing a single comment's thread
view the rest of the comments
[–] just_another_person@lemmy.world 130 points 16 hours ago (2 children)
[–] sexy_peach@feddit.org 88 points 15 hours ago (7 children)

No if this is proven it would be a real scandal and would bring a lot of users to better alternatives.

If it's false that's good too, since then WA has e2e encryption

[–] pressanykeynow@lemmy.world 1 points 4 hours ago

If it's false

How would we know?

[–] MrSoup@lemmy.zip 74 points 15 hours ago (5 children)

would bring a lot of users to better alternatives.

Most users of whatsapp don't care about e2e. They hardly even know what it is.

[–] sexy_peach@feddit.org 2 points 2 hours ago

True. But some would care about broken promises

[–] Cethin@lemmy.zip 2 points 5 hours ago

They don't know what e2e encryption is, but they sure as hell know what "employees have access to all your messages" means. Sure, it makes it harder for them to find a good alternative, but it will scare some away from Meta (unknown how many will actually care).

[–] dependencyinjection@discuss.tchncs.de 29 points 13 hours ago (1 children)

Right. This place sometimes forget that we are tiny community of techies that hate the system. Makes me see this place as a bit of a circlejerk at times.

[–] Chronographs@lemmy.zip 9 points 11 hours ago

Yeah the venn diagram overlap of “people who understand and care about e2ee enough to drop a messaging app for not supporting it” and “people who use whatsapp” has to be a sliver

[–] timestatic@feddit.org 9 points 10 hours ago

No but average people understand the concept of meta reading and accessing your private message. That would be a scandal and righly so

[–] Rooster326@programming.dev 5 points 12 hours ago

They don't but they do know what "Any Meta employee, and every US government employees, can read all of your messages" means

Especially if they saw it now

[–] just_another_person@lemmy.world 12 points 15 hours ago (2 children)

It's already a known risk, because WA uses centralized key management and servers, and always has regardless what Meta says. If you believe their bullshit, then I feel sad for you.

Also...you don't think that LAWYERS willing to go up against Meta would have rock solid proof from these whistleblowers FIRST before filing a lawsuit?

C'mon now, buddy.

[–] sexy_peach@feddit.org 1 points 2 hours ago

What do you want from me here?

[–] yesman@lemmy.world 6 points 13 hours ago (1 children)

Also…you don’t think that LAWYERS willing to go up against Meta would have rock solid proof from these whistleblowers FIRST before filing a lawsuit?

This is not how civil court works. It's not trial by combat. There is no standard for the quality of lawsuits filed. And despite what the ambulance chasers say on TV, Layers get paid even when they loose.

"alleged in a lawsuit..." is the same level of credibility as "they out here saying...".

[–] just_another_person@lemmy.world 5 points 13 hours ago

It doesn't matter if it's criminal or civil. The costs to bring such a case are massive, and you're leaving yourself open to a behemoth like Meta just dragging out the case for lengthy periods of time which drastically increase those costs.

No law firm files suit against a giant company like this unless they have rock solid proof they will, at the very least, land a settlement plus recuperation of costs. Just not a thing.

[–] Nioxic@lemmy.dbzer0.com 2 points 11 hours ago (1 children)

Mark zuckerberg eats scandals for breakfast

[–] sexy_peach@feddit.org 1 points 2 hours ago

Yes but Whatsapp has been pretty reliable and trustworthy for many people. No ads etc

[–] devfuuu@lemmy.world 0 points 9 hours ago (1 children)

It would not. People don't care. People don't care that meta is an evil corp. Encryption is not even close to the top 10 reasons people use that app. It's just a random word normal users throw around because marketing told them it's good.

[–] sexy_peach@feddit.org 1 points 2 hours ago

Normal users don't talk about encryption at all but they somewhat trust WhatsApp

[–] sauerkrautsaul@lemmus.org 2 points 15 hours ago

we can't lose!

[–] RIotingPacifist@lemmy.world 2 points 15 hours ago* (last edited 15 hours ago) (7 children)

What are the better alternatives? because it seems like the comment section is flooded with people (yourself included) that don't understand that most (probably all) e2e messaging apps are vulnerable to this attack as long as they trust a centralized server.

The issue isn't an encryption one, it's a trust one that requires you to trust the makers of the messaging app and the servers the apps connect to (and the method by which the app is distributed to you).

[–] sexy_peach@feddit.org 2 points 2 hours ago (1 children)

What is your alternative? Everybody codes their own app??

Also you're unhinged in these comments

[–] RIotingPacifist@lemmy.world 0 points 2 hours ago

People should understand the limits of E2E encryption.

I'd rather be unhinged than wrong.

[–] TheNamlessGuy@lemmy.world 3 points 3 hours ago

Briar. Designed for, for example, journalists in countries that may persecute them for saying the wrong thing. Can technically be run completely on a mesh network, meaning it's actually truly decentralized.

[–] Zak@lemmy.world 27 points 14 hours ago* (last edited 14 hours ago) (1 children)

Signal uses reproducible builds for its Android client, and I think for desktop as well. That means it's possible to verify that a particular Signal package is built from the open source Signal codebase. I don't have to trust Signal because I can check or build it myself.

If I don't have extreme security needs, I don't even have to check. Signal has a high enough profile that I can be confident other people have checked, likely many other people who are more skilled at auditing cryptographic code than I am.

Trusting the server isn't necessary because the encryption is applied by the sender's client and removed by the recipient's client.

[–] pressanykeynow@lemmy.world 1 points 3 hours ago

likely many other people who are more skilled at auditing cryptographic code than I am

Maybe but that doesn't mean you have the same app they do, Google may have different apks for people who could check it and for those who won't.

[–] just_another_person@lemmy.world 21 points 15 hours ago (1 children)
[–] Pika@sh.itjust.works 13 points 14 hours ago* (last edited 14 hours ago) (1 children)

Just because it's centralized doesn't mean that it falls under this risk sector. Theoretically if the app was open sourced and was confirmed to not share your private key remotely on generation (or cross sign the key to allow a master key...), then the most the centralized server could know is your public key, the server wouldn't have the ability to obtain the private key (which is what is needed to read the e2e encrypted messages)

This process would be repeated for the other party. The cool part of that system is you can still share your public keys via the centralized server, so you wouldn't need to share the key externally. You just need to be able to confirm that the app itself doesn't contain code to send your private key to the centralized server. Then checking integrity is as easy as messaging your friend to post what their public key is, and that public key would need to match the public key that the server is supplying as your contact.

The server can't MiTM attack it because the server has no way of deciphering the message in the first place, so the most it could do is pass the message onto the proper party whom has the private key to be able to decrypt it.

Not that I have any other suggestions aside from signal though, there aren't many centralized e2e chat services. Most use client to server encryption which would allow decryption server side.

[–] RIotingPacifist@lemmy.world -1 points 14 hours ago (1 children)

Just because it’s centralized doesn’t mean that it falls under this risk sector.

The attack as described almost certainly involves the server sending a message to your client and then having the messages replicated via a side channel to Whatsapp without breaking E2E encryption (it could be adding them as a desktop client or adding them as a hidden participant in all chats, that isn't clear in the article)

If you could run Whatsapp without connecting to Meta, you would be safe from this attack, but as you’ve pointed out a secure client is a better solution.

[–] Pika@sh.itjust.works 3 points 13 hours ago* (last edited 13 hours ago)

Fully agree that in this case if the claim is true (they have had a few of these claims), it's likely whatsapp either making itself a companion app that's hidden, or has some form of escrow in place to allow deciphering the messages. (Considering Messenger allows decrypting e2e chats with a 6 digit security pin, I'm leaning towards an escrow)

I was just mentioning that this isn't a fault of it being centralized, this is a design choice by the company when implementing e2e encryption, and that a properly functioning system would never give the server the ability to decipher the messages in the first place.

[–] axx@slrpnk.net 6 points 14 hours ago

Element / matrix.

[–] Maestro@fedia.io 6 points 14 hours ago (2 children)

With e2e you don't need to trust the servers. You only need to trust the client that does the encryption.

[–] pressanykeynow@lemmy.world 1 points 3 hours ago (1 children)

Should you not also trust your device hardware, it's os and the market you got the app from?

[–] Maestro@fedia.io 2 points 2 hours ago

That's a given I think. If you can't trust the OS then you can't trust the client.

[–] RIotingPacifist@lemmy.world -1 points 14 hours ago

The attack as described almost certainly involves the server sending a message to your client and then having the messages replicated via a side channel to Whatsapp without breaking E2E encryption.

But yes the point is you can't trust the clients.

If you could run Whatsapp without connecting to Meta, you would be safe from this attack, but as you've pointed out a secure client is a better solution.

[–] Sunspear@piefed.social 40 points 16 hours ago

Shocked, I tell you