this post was submitted on 27 Jan 2026
865 points (99.7% liked)
Technology
79355 readers
4328 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
If you can bypass it in the middle it is by definition not end to end encryption. The entire point of end to end encryption is that only the endpoints are able to decrypt the messages and everyone in between only has access to the encrypted messages. If that's not the case that's just normal encryption not end to end.
I think we're dealing with weasel lawyer words here. Meta can boast that messages E2E encrypted between you and the recipient, but that implies nothing about key storage or security, or about other channels through which the app could send message data before it is encrypted. It may be E2EE between you and the recipient, and also sent in plaintext to Meta. Plus E2EE of messages implies nothing about message metadata.
Your device is an endpoint, it's leaking the information to Meta, that isn't a MITM.
Unless you redefine the end in e2e to mean your eyes, it's still e2e encrypted.