Shocking.
Technology
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
Only a tech illiterate can expect privacy from a closed source program, open source is a requirement for both privacy and security.
I would argue that the vast majority of users don't use WhatsApp for privacy. In the UK at least, it's just the app everyone has and it works. I've actively tried to move friends over to signal, to limited success, but honestly it can be escaped how encryption is not it's killer IP.
Just assume any digital platform you're using isn't safe at this point.
I never used WhatsApp, but what made people think they used e2e? I'm way passed blindly believing what any company says they do without proof. I'd expect some kind of key or certificate management in the app, is that present?
Heck.. my default is still to think every website does plaintext password storage. I can't prove it, but neither can they. Stop storing my passwords in plaintext lemmy! /s
Around a year ago WhatsApp had large ads that just said "no one else can read your messages." I don't think most people thought that some one could, which makes me wonder why they were paying so much to say it.
Any time they get asked questions like "Are my messages visible only to me?", they answer with a very canned response like "Your messages are encrypted from end-to-end and can't be read by anyone while in transit" ... or words to that effect. I have never seen them state that no analytics or telemetry is happening on the unencrypted side by the client. Which has always bothered me.
Back at the start WhatsApp wasn't free, although it was pretty cheap. Then Meta bought it and made it free. Some time after that, the founders left and started Signal.
The E2E encrypted protocol WhatsApp used to use was the Signal protocol. When the OG founders left and created Signal they revamped it, calling it the Signal V2 protocol. Whether WhatsApp still uses that original Signal protocol or not is probably not known to many people outside of Meta, but WhatsApp definitely used to be E2E encrypted prior to Meta's purchase.
I deleted my WhatsApp account around the time Meta announced they were merging all of their messaging stuff together, e.g. Facebook Messenger, Instagram etc.
Im not a big fan of meta and WhatsApp, but these claims are a bit much. Any employee gets access to messages through a well documented internal process? "No separate decryption step is required" , so the WhatsApp CLIENT is not doing any actual e2e encryption and no attempt at reverse engineering or traffic analysis has ever seen that this is the case?
Where can one see, what these whistleblowers have actually published? I would expect to see this "simple process" and how that interface actually works... And I would expect any journalist to request some proof (show me the last message i sent to Alice) before trusting an anonymous whistleblower making such an extraordinary claim.
From what I heard so far, that anonymous whistleblower could be a troll or an ex-employee who just wants to cause some trouble for meta.
We should not trust anything blindly, even if it fits with our view of the world. Meta is an evil company, but as long as there is no indication for these specific allegations to be true, we should treat them as unfounded allegations.
In principle the messages themselves could be E2E encrypted, but the closed-source WhatsApp client could transmit decryption keys to Meta HQ without anyone finding out. As long as the client or the client device is unsafe and not trusted, E2EE is not really effective. Which is why one should always demand a FOSS client for E2EE.