A 10-month Commerce Department probe concluded Meta could view all WhatsApp messages in unencrypted form

  • codenamekino@lemmy.world
    link
    fedilink
    English
    arrow-up
    35
    ·
    3 hours ago

    I’m just here to satisfy my confirmation bias, but my question all along has been this: how does Meta simultaneously satisfy their claims of both E2EE and content moderation on WhatsApp? I can’t say that I’ve done anything even close to a deep dive on the topic, but those two things seem mutually exclusive.

    • baatliwala@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 hours ago

      You can actually report a message to WhatsApp within the app. If you report the message it then the full text gets sent to WhatsApp.

    • HereIAm@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      ·
      3 hours ago

      I don’t particularly know much about this specific topic but, it would be trivial for them to read what’s seen in the app. The encrypted part is only during transfer of a message, your app is still decrypting it to plain texts, and meta can just read the message at that point.

  • yetAnotherUser@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 hour ago

    What I don’t understand yet is why there haven’t been any independent cybersecurity experts capable of finding a backdoor in WhatsApp. How hard would it be for an expert without access to the source code to find one? Are any independent entities monitoring WhatsApp’s security at all??

    • daniskarma@lemmy.dbzer0.com
      cake
      link
      fedilink
      English
      arrow-up
      3
      ·
      44 minutes ago

      It’s not about being vulnerable. It’s probably a very tight software.

      It’s just that Meta stores the private keys of the e2e encryption. So they can decrypt any and all chats if they want to.

    • fodor@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      ·
      38 minutes ago

      The clients are one question, but the servers are another. If the backdoor is on the server end, which it sure looks like, then your experts won’t find anything by examining the client.

      • nibbler@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        34 minutes ago

        If the client was open source, it could be verified by inspecting this source alone. To my understanding, the clients do real end to end encryption. This is the good part. They also have some functionality to re-encrypt the data or export the secret key to let new peers take part, or so i guess. This is how your web browser can also read them after you peer it up. Now there might or might not be a function in the client, where meta can request the private key or re-encryption. This is really hard to figure out without having the source code.

    • R00bot@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      42 minutes ago

      Hey I work in cyber security. Just because an app has a backdoor doesn’t mean that the backdoor can be accessed by anyone. Accessing this backdoor would likely mean compromising meta themselves, not just the app or its communications.

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    ·
    3 hours ago

    I never assumed that this presumed “end to end encryption” was secure in any way. The key exchange either runs over Meta servers, and they just log them, or the client software simply surrenders the key (maybe always, maybe on demand) together with the data stream that still runs over Meta servers.

    • zergtoshi@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      3 hours ago

      They can log anything they want and have nothing useful, if the encryption protocol is sound.
      Have a look at how TLS is designed, if you want to know more.

        • zergtoshi@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 hours ago

          But the key exchange is not the issue then.
          Access to private keys is.
          If the host system, on which the key exchange runs, is compromised, you’re toast.

          • Railcar8095@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 hour ago

            Where’s the private key? I can get a new phone, log with WhatsApp and download all the historical messages without intruducing any additional password or key.

            I assume they have all the required data too.

            • MalMen@masto.pt
              link
              fedilink
              arrow-up
              1
              ·
              22 minutes ago

              @Railcar8095 @zergtoshi actually is not my exlerience with whatsapp, since I have the backups disable, everytime I change phones I lost all my conversations. But since whatsapp is closed source, the app can indeed use encryption to comunicate p2p, but I will allways assume that the key is logged by meta, “just in case”

            • zergtoshi@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              28 minutes ago

              Sounds like a compromised phone in the sense that it doesn’t protect (and instead transmit) the private key.

  • purplemonkeymad@programming.dev
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 hours ago

    So that ad campaign that they ran saying no one but you can see your messages. That was a bit strange that they were pushing it, since no one appeared to be saying otherwise, might be a lie? I never would have guessed.

  • floofloof@lemmy.ca
    link
    fedilink
    English
    arrow-up
    85
    ·
    edit-2
    6 hours ago

    “The claim that WhatsApp can access people’s encrypted communications is patently false,” Meta spokesperson Andy Stone said. He added that the bureau had already “disavowed this purported investigation, calling its own employee’s allegations unsubstantiated.”

    I can’t help but notice that in response to people’s concern that Meta may be able to read people’s messages, the Meta spokesperson responds that WhatsApp can’t read them. A little bit of administrative juggling on Meta’s end so that the team with access to the messages doesn’t fall within the WhatsApp department, and both claims could be true.

    • IratePirate@feddit.org
      link
      fedilink
      English
      arrow-up
      15
      ·
      4 hours ago

      But Facebook/“Meta” would never lie.

      Oopsie! Hang on, they even lie to lawmakers in case buying them off fails? Bummer!

      Seriously: this company needs to be scoured from the face of the earth.

    • FauxLiving@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      ·
      edit-2
      6 hours ago

      Yeah, there are lots of ways for this to be true but misleading:

      The communications are not encrypted if they have the keys.

      The encrypted communications are not the people’s. By the TOS everything is the property of WhatsApp and they can access their own ‘Business Records’ perfectly legally.

      A third party, like a federal agency, isn’t WhatsApp. (WhatsApp can also voluntarily give their ‘Business Records’ to said agencies without warrant or subpoena.)

      Meta isn’t WhatsApp.

      An internal project with an undisclosed codename isn’t WhatsApp.

      • Valmond@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 hours ago

        Nitpicking; even if they have the keys, the messages can be encrypted. It’s just worthless as they can now decrypt them.

    • Lost_My_Mind@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      6 hours ago

      C’mon. It’s not that hard. You’re making the assumption that Andy Stone is telling the truth, with a gotchya astrict.

      What if…the big business just…LIES???

  • zergtoshi@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    3 hours ago

    And here I thought the E2EE of Whatsapp was based on the one developed by Signal or at least so they say.
    But I guess it’s hard to inspect anything, if it’s no open source software.
    I’m so glad there’s SIgnal and a lot of my contacts use it.
    Back when it was called Textsecure it was a different story.

  • cyberduck@aussie.zone
    link
    fedilink
    English
    arrow-up
    15
    ·
    5 hours ago

    If you can’t see the code (closed source) then treat it as they’re lying and it isn’t end to end encrypted

  • MrSulu@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 hours ago

    Settle down. There’s nothing to see here. Move along quietly and please remain calm… /s

  • theunknownmuncher@lemmy.world
    link
    fedilink
    English
    arrow-up
    37
    ·
    edit-2
    7 hours ago

    The most important question to ask when evaluating end-to-end encryption: who manages the keys?

    If Facebook manages all of the keys and is responsible for telling which public key belongs to who, then of course Facebook can read every message.

    • lemonhead2@lemmy.world
      link
      fedilink
      English
      arrow-up
      23
      ·
      6 hours ago

      oh lol. the trust chain is harder and harder to verify these days. i miss the good old days where I would write emails in vi and encrypt with gpg.

      I still write emails with vi. but I lost touch with the one other friend I had who how to use gpg 😂😂😂

    • qprimed@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 hours ago

      even better - as far as I am aware the client isn’t open (and even if it were, is your installed build from the same source?).

      so, even if the keys are local only, who says there isn’t a hidden API that simply sends locally decrypted content back to a remotely calling endpoint?

      • logi@piefed.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        5 hours ago

        That, and if WhatsApp has the keys, then no amount of encryption is going to help.

        If I remember, the allegation was that they did keep all the keys and many employees could request them to decrypt specific sessions.