this post was submitted on 30 Apr 2026
753 points (99.0% liked)

Technology

84256 readers
3245 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

A 10-month Commerce Department probe concluded Meta could view all WhatsApp messages in unencrypted form

you are viewing a single comment's thread
view the rest of the comments
[–] codenamekino@lemmy.world 77 points 1 day ago (2 children)

I'm just here to satisfy my confirmation bias, but my question all along has been this: how does Meta simultaneously satisfy their claims of both E2EE and content moderation on WhatsApp? I can't say that I've done anything even close to a deep dive on the topic, but those two things seem mutually exclusive.

[–] baatliwala@lemmy.world 25 points 1 day ago (2 children)

You can actually report a message to WhatsApp within the app. If you report the message it then the full text gets sent to WhatsApp.

[–] Rivalarrival@lemmy.today 10 points 1 day ago (2 children)

That's a little disingenuous...

  1. You receive an encrypted message.
  2. You decrypt the message.
  3. You report the message.
  4. You forward the decrypted message.

When you send a message, no E2EE scheme can prevent your recipient from forwarding the decrypted message to a third party.

[–] GamingChairModel@lemmy.world 13 points 1 day ago

It's really important for people to understand that E2EE cannot protect the message portions that aren't between the ends themselves. The best encryption in the world can't help you if the person you're talking to is an undercover cop, because that "end" can do with the plaintext whatever they want, including record/store/forward the plaintext of any messages they then encrypt and send, or any messages they receive and then decrypt.

That's not a flaw of the E2EE protocol itself, but is a limit to the scope of protection that E2EE provides.

[–] Prathas@lemmy.zip 3 points 1 day ago

Well, yeah, you can't control other people. Even if you use a walkie-talkie, they can still record your voice with a device. Ideally you should only be talking about safely publishable content, or with mature-enough individuals. We ultimately must settle for good-enough...

[–] NaibofTabr@infosec.pub 4 points 1 day ago (1 children)

So... anyone with access to the report API can read any message they want?

[–] a4ng3l@lemmy.world 3 points 1 day ago (1 children)

Any reported message ? Back when I was doing anti spam at my ISP we could read reported spam from our customers. Obviously not all mails from / to the customers. That would be way disproportionate.

[–] NaibofTabr@infosec.pub 6 points 1 day ago (2 children)

If this is true:

If you report the message it then the full text gets sent to WhatsApp.

That means there's a software switch that dumps a plaintext copy of a supposedly encrypted message when flipped.

Therefore, all you need to read any WhatsApp message is the ability to flag the message as "reported", and access to wherever the plaintext copies get sent.

Considering how often security is an afterthought for corporations, the access part is probably easy.

[–] a4ng3l@lemmy.world 13 points 1 day ago (1 children)

The easiest implementation of this is that the recipient of an infringing message flags it from its local client. At that point it’s not encrypted if their claim of e2ee is true.

It also means that only parties involved in the message exchange can flag / report them.

Corporations are often not so monolithic ; the guys doing abuse are likely not the one who try to milk users (looking at you marketing).

[–] WhyJiffie@sh.itjust.works 1 points 1 day ago (1 children)

I don't want to defend whatsapp, but if messages are actually properly end to end encrypted, but one of the recipients (one of the ends) knowingly shares it (e.g. with the report function), that is still end to end encryption.

don't be surprised if signal or matrix implements this. I'm strongly against scanning messages, but if the recipient willfully decides so, they should be able to share a message with moderators. that would be an actual tool against actual pedophiles, and scammers.
but this can only work safely if the client is not sending the decrypted message, because it could modify it, but instead it sends the decryption keys for it. both signal and matrix are regularly rotating the keys, so it wouldn't grant the moderators to read all messages, but it would grant them the ability to see what was actually sent. with that the client should also show how far into the past messages will be revealed to moderators, so they can decide if that's ok for them.

[–] a4ng3l@lemmy.world 2 points 1 day ago

Yup we agree on that. This pattern is actually the most sensible approach to support privacy. Whatever happens in transmission.

[–] Rivalarrival@lemmy.today 2 points 1 day ago (1 children)

That means there’s a software switch that dumps a plaintext copy of a supposedly encrypted message when flipped.

Kinda, sorta, but no, not really. What's happening is that the recipient is decrypting the message. When you report the message, you include a cleartext copy with your report.

The "switch" you are talking about is in the same app that is doing the decryption. For the bad actor to toggle that "switch", they would have to control the app.

[–] Flagstaff@programming.dev 2 points 1 day ago* (last edited 1 day ago) (1 children)

For the bad actor to toggle that "switch", they would have to control the app.

Are you talking about physical control? Regardless, it's closed-source... There is nothing that says they can't also generate the keys on the other end that they had your devices generate. Outside of open source code that's buildable from source, they can claim whatever they want about lack of access to switches.

[–] Rivalarrival@lemmy.today 1 points 16 hours ago (1 children)

Technically true.

However, doing so would be perpetrating a fraud. If they denied the capability you're talking about in response to a warrant or subpoena, someone would be in contempt.

I don't know if any corpo actually cares about such things, but I know that if you or I were to do this, we'd quickly find ourselves broke and possibly in prison.

[–] Flagstaff@programming.dev 1 points 12 hours ago (1 children)

But my point is that Meta is committing fraud against the public for advertising WhatsApp as E2EE when it's not, as per this entire post...

[–] Rivalarrival@lemmy.today 2 points 9 hours ago (1 children)

There is no indication that they can actually acquire the clear text of an E2EE communicatiom. without one of the ends being complicit in the process. There is no evidence of the fraud you refer to.

That doesn't mean they are telling the truth, merely that they haven't been proven to have lied. They could release their source code tomorrow. That code could prove you are correct and they are liars. That code could prove that they are correct, and you were wrong.

We don't have to resort to unfounded claims to justify criticism here. Proving their claims to be unverifiable is more damning than failing to prove they are committing fraud.

[–] Flagstaff@programming.dev 1 points 7 hours ago

Hmm... true, fair! ∆

[–] HereIAm@lemmy.world 26 points 1 day ago

I don't particularly know much about this specific topic but, it would be trivial for them to read what's seen in the app. The encrypted part is only during transfer of a message, your app is still decrypting it to plain texts, and meta can just read the message at that point.