Forgot your password?
typodupeerror
Encryption

WhatsApp End-to-End Encryption Allegations Questioned By Some Security Experts, Lawyers (msn.com) 31

Several security experts have "questioned the lack of technical detail" in that lawsuit alleging WhatsApp has no end-to-end encryption, reports the Washington Post: "It's pretty long on accusations and thin on any sort of evidence," Matthew Green, a cryptography professor at Johns Hopkins University, said over Signal. "WhatsApp has been very consistent about using end-to-end encryption. This lawsuit seems to be a nothingburger." Nicholas Weaver, a security researcher at the International Computer Science Institute, criticized the lawsuit in a post on Bluesky for lacking detail needed to back up its claims. "They don't even do a citation to the actual whistleblowers," he wrote, calling the suit "ludicrous."
And Meta has done more than just deny the allegations: On Wednesday, WhatsApp sent a letter to [law firm] Quinn Emanuel threatening to seek sanctions against the firm's lawyers in court if they do not withdraw the suit, according to a copy reviewed by The Washington Post. "We're pursuing sanctions against Quinn Emanuel for filing a meritless lawsuit that was designed purely to grab headlines," Woog said by WhatsApp message. Woog also suggested the suit against WhatsApp was related to Quinn Emanuel's work on a separate case, between the social network giant and the spyware company NSO Group. The surveillance vendor is appealing a $167 million judgment entered against it in federal court last May, after a jury found that NSO's Pegasus tool exploited a weakness in the WhatsApp app to take over control of the phones of more than 1,000 users. An attorney from Quinn Emanuel joined NSO's legal team on that case on Jan. 22, according to legal filings, and different attorneys from that firm filed the case against WhatsApp on Jan. 23. "We believe a lawsuit like this is an attempt to launder false claims and divert attention from their dangerous spyware," Woog said.
"It's very suspicious timing that this is happening as that appeal is happening," Maria Villegas Bravo, counsel at the Electronic Privacy Information Center, told the site Decrypt, "as NSO Group is trying to lobby to get delisted from sanctions in the U.S. government."

EPIC's counsel also told the site that the complaint appears light on factual detail about WhatsApp's software: "I'm not seeing any factual allegations or any information about the actual software itself," Villegas Bravo said. "I have a lot of questions that I would want answered before I would want this lawsuit to proceed.... I don't think there's any merit in this lawsuit," Villegas Bravo said.

Meta has forcefully rejected the allegations. In a statement shared with Decrypt, a company spokesperson called the claims "categorically false and absurd... WhatsApp has been end-to-end encrypted using the Signal protocol for a decade," the spokesperson said. "This lawsuit is a frivolous work of fiction, and we will pursue sanctions against plaintiffs' counsel."

This discussion has been archived. No new comments can be posted.

WhatsApp End-to-End Encryption Allegations Questioned By Some Security Experts, Lawyers

Comments Filter:
  • But Meta owns both the ends. They donâ(TM)t need to break the encryption to spy on you.

  • Meta has forcefully rejected the allegations. In a statement shared with Decrypt, a company spokesperson called the claims "categorically false and absurd...

    I won't be surprised if the parties somehow settle out-of-court.

    • Meta has forcefully rejected the allegations. In a statement shared with Decrypt, a company spokesperson called the claims "categorically false and absurd...

      They didn't claim state of the art or even competent encryption. Just encryption. ROT13 would count. :-)
      https://en.wikipedia.org/wiki/... [wikipedia.org]

      • by allo ( 1728082 )

        They claimed using Axolotl (Signal) encryption. That's more or less sota.
        The bug will probably not be in the encryption library, but in key management. How do you control for which key(s) WhatsApp encrypts the message? Do you know if it encrypted the last message with the same key as yesterday? There are a lot of ways to sneak in a MITM without being caught. They would be stupid to have an obvious backdoor in the client everyone can examine. Either it is a clever bug or it can be pushed to clients when need

  • The protocol is good.

    The client? Who knows. The Facebook version of the Double Ratchet includes "Abuse Reporting" [fb.com] to complain to the manager about a message you got.

    Could a closed client accept some secret message to cause the recipient to narc on the sender? It could, but that doesn't mean it does.

    Which version of which algorithm, precisely, is used in each version of their chat apps? Who knows.

    Why is anybody who needs secure comms using a closed source client? Who knows.

  • by PCM2 ( 4486 ) on Saturday January 31, 2026 @02:24PM (#65961178) Homepage

    "It's pretty long on accusations and thin on any sort of evidence," Matthew Green, a cryptography professor at Johns Hopkins University, said over Signal.

    Yeah, buddy, you might be good at reading scientific papers and research, but you're not so good at reading lawsuits. The suit itself is just a bunch of claims. Evidence is the stuff you present in court. So if you're thinking, "But I'm not a party to this suit, so I don't have access to all the evidence attorneys are planning to present" ... now yer thinkin'.

    • Errr no. You may be good at posting on Slashdot, but you're not so good at reading lawsuits. Claims themselves usually contain enough information to identify if a suit is frivolous or not. When you pull unsubstantiated bullshit out of your arse and put it in a claim, then expect the label given. Good lawsuits provide enough information in the claim to demonstrate the suit has value and merit. In some cases if you don't do this you won't even manage to get to a stage where evidence is presented (ever heard t

  • https://engineering.fb.com/202... [fb.com]

    Their device link feature doesnâ(TM)t alert the user when a new device is added, and it doesnâ(TM)t require any action from them. The server can request the private encryption key from the primary device and provide it to the new device.

    Whatâ(TM)s stopping Meta from adding one of their devices to your account?

    Signal app on the other hand requires user action on the primary device, and it modifies the device signature, alerting all chat partners of the security

    • Did you read that article? The companion app communicates with the phone, there's no suggestion of requesting private keys. That wouldn't work with signal protocol anyway because of ratcheting.
    • Errr no. 1. The user is absolutely notified when a device is linked. Even if the "linked devices" page is open in the app you still get a notification that a device has been linked (which seems redundant, but blocks precisely the issue you postulate). And yes I checked this just now before typing it by linking a new device.

      2. The server is not involved at any point. A client action from your phone is required to initiate a key exchange with the added device, just like from Signal. Given the architecture the

  • Let's assume they did not backdoor the protocol.
    But I'm sure the collecting of meta data by Meta is a big privacy problem.
    • Bingo.
      This is a sleight of hand. Look over here (encryption) while we pickpocket you from all your pockets (metadata).
      What is being said is not nearly as valuable as who is saying what to whom.
      I don't have the chart in front of me, but, it shows how Signal collects like 3 metadata points, and Whatsapp collects..a lot more... like 30 data points.
    • We know they collect meta data though, they're transparent about that.
      • by Teun ( 17872 )
        'We' know it but does the regular consumer?
        And does he understand the consequences, is he informed about them?
        • That's like asking if the average homeowner knows that the post office has their address. They should know it... But who cares if they don't?
      • good point.
        I've been screwing your wife for some time now.
        But it's all good, now that you know.
  • Sue the law firm providing counsel and legal services to the plaintiffs? Don't they actually have to go after the parties initiating the suit?

    • by taustin ( 171655 )

      Lawyers are obligated to act in certain ways, and when they don't, they can be held liable. It's a high bar, but it can, and does, happen.

      (More likely would be them giving their clients bad advice, and the client suing them.)

  • In case you were wondering and didn't read TFA, "Woog" refers to WhatsApp spokesman Carl Woog.

  • So.... if I use wireguard, and send info from my device to another device on the network, my connection is encrypted from my device to the server, decrypted with my keys, passes thru RAM unencrypted, then it's re-encrypted with your keys to send to the other device... amirite?

    So... with Signal protocol is the data in RAM still encrypted ? or is it like Wireguard, where point to point means device to server?

    If scenario 1 is correct for Signal/Whatsapp, then a custom kernel module could duplicate/read unencry
  • If you really thought that a chat app made by Meta / Facebook was actually end to end encrypted you're a fucking RETARD, ABSOLUTE FUCKING RETARD. Meta / Facebook has no motive to be providing this app / service unless they're making money, If you're not paying for it directly then you're paying for it thought data collecting and mining.

Diplomacy is the art of saying "nice doggy" until you can find a rock.

Working...