Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How does Meta cooperate with the authorities? Isn't Whatsapp supposed to be end-to-end encrypted?


Read the founder exit letter. whatsapp is definitely not e2e encrypted for all features.

You leak basic metadata (who talked to who at what time).

You leak 100% of messages with "business account", which are another way to say "e2e you->meta and then meta relays the message e2e to N reciptients handling that business account".

Then there's the all the links and images which are sent to e2e you->meta, meta stores the image/link once, sends you back a hash, you send that hash e2e to your contact.

there's so many leaks it's not even fun to poke fun at them.

And I pity anyone who is fool enough to think meta products are e2e anything.


> with "business account", which are another way to say "e2e you->meta and then meta relays

actually its a nominated end point, and then from there its up to the business. It works out better for meta, because they aren't liable for the content if something goes wrong. (ie a secret is leaked, or PII gets out.) Great for GDPR because as they aren't acting as processor of PII they are less likley to be taken to court.

Whatsapp has about the same level of practical "privacy" (encryption is a loaded word here) as iMessage. The difference is, there are many more easy ways to report nasty content in whatsapp, which reported ~1 million cases of CSAM a year vs apples' 267. (not 200k, just 267. Thats the whole of apple. https://www.missingkids.org/content/dam/missingkids/pdfs/202...)

Getting the content of normal messages is pretty hard, getting the content of a link, much easier.

Its not signal, but then its never meant to be.


iMessage is not on the same playing field as Whatsapp and Signal. Apple has full control over key distribution and virtually no one verifies Apple isn't acting as a MitM. Whatsapp and e2e encrypted messenger force you to handle securely linking multiple devices to your account and gives you the option to verify that Meta isn't providing bogus public keys to break the e2e encryption.

https://engineering.fb.com/2023/04/13/security/whatsapp-key-...

For iMessage, Apple can just add a fake iDevice to your account and now iMessage will happily encrypt everything to that new key as well and there's zero practical visibility to the user. If it was a targeted attack and not blanket surveillance then there's no way the target is going to notice. You can open up the keychain app and check for yourself but unless you regularly do this and compare the keys between all your Apple products you can't be sure. I don't even know how to do that on iPhone.


never thought about using csam image hash alerts as a measure of platform data leaks (and popularity as i doubt bots will be sharing them). that's very smart.

and show that fb eclipse everyone by a insane margin it's scary!

about your point on business accounts, the documents i reviewed included dialog tree bots managed by meta. not sure if not having that change things... but in that case it was spelled out that meta is the recipient


Its more a UX/org thing. In iMessage how do you report a problematic message? you can't easily do it.

In whatsapp, the report button is on the same menu that you use to reply/hide/pin/react.

Once you do that, it sends the offending message to meta, unencrypted. To me, that seems like a reasonable choice. Even if you have "proper" e2ee, it would still allow rooting out of nasty/illegal shit. those reports are from real people, rather than automated CSAM hashing on encrpyted messages. (although I suspect there is some tracking before and after.)

Its the same with instagram/facebook. The report button is right there. I don't agree with FB on many things, but this one I think they've made the right choice.


Exactly. Another case of a business hijacking a term and abusing it to describe something else.


Telegram is for the most part not end-to-end encrypted, one to one chats can be but aren't by default, and groups/channels are never E2EE. That means Telegram is privy to a large amount of the criminal activity happening on their platform but allegedly chooses to turn a blind eye to it, unlike Signal or WhatsApp, who can't see what their users are doing by design.

Not to say that deliberately making yourself blind to what's happening on your platform will always be a bulletproof way to avoid liability, but it's a much more defensible position than being able to see the illegal activity on your platform and not doing anything about it. Especially in the case of seriously serious crimes like CSAM, terrorism, etc.


Slightly offtopic. Why would telegram have chosen to not make it e2ee like this? I'm trying to see the motivation for this?


Because people generally want features like persistent chat history across all devices to "just work".


if its not not end-to-end encrypted, what does that mean? whats the method that govts access these messages?


You can simply join those channels. Getting an invite is not hard, or even unnecessary, from what I hear.


End-to-end encrypted means that the server doesn’t have access to the keys. When server does have access, they could read messages to filter them or give law enforcement access.


If law enforcement asked them nicely for access I bet they wouldn't refuse. Why take responsibility for something if you can just offload it to law enforcement?

The issue is law enforcement doesn't want that kind of access. Because they have no manpower to go after criminals. This would increase their caseload hundredfold within a month. So they prefer to punish the entity that created this honeypot. So it goes away and along with it the crime will go back underground where police can pretend it doesn't happen.

Telegram is basically punished for existing and not doing law enforcement job for them.


>I bet they wouldn't refuse

Apparently, they have. Sorry for your bet.


Maybe they didn't ask nicely. Or they asked for something else. There's literally zero drawback for service provider to provide secret access to the raw data that they hold to law enforcement. You'd be criminally dumb if you didn't do it. Literally criminally.

I bet that if they really asked, they pretty much asked Telegram to build them one click creator that would print them court ready documents about criminals on their platform so that law enforcement can just click a button and yell "we got one!" to the judge.


> There's literally zero drawback for service provider to provide secret access to the raw data that they hold to law enforcement.

That's not true. For one things, it is expensive. For another, there's a chance people will find out and you'll lose all your criminal customers... they might even seek retribution.

> I bet that if they really asked, they pretty much asked Telegram to build them one click creator that would print them court ready documents about criminals on their platform so that law enforcement can just click a button and yell "we got one!" to the judge.

You seem to believe, without having looked at the publicly available facts of the matter, that the problem is law enforcement didn't say "pretty please". The fact of the matter is that they've refused proper law enforcement requests repeatedly; if anyone has been rude about it, it's been Durov.


Answering law enforcement letters, even if it's just to say that data cannot be provided, is some 80% of cooperation needed.

Meta can provide conversation and account metadata (Twitter does the same - or used to do at least), or suspend accounts


Supporting E2EE doesn’t imply a failure to cooperate. This is not the issue here.


The chats are encrypted but the backup saved in the cloud isn't. So if someone gets access to your Google Drive he can read your WhatsApp chats. You can opt-in to encrypt the backup but it doesn't work well.


You can report people and have their messages sent to Meta for review.


Meta seems to shy away from saying they don't look at the content in some fashion. Eg they might scan it with some filters, they just don't send plaintext around.


In a number of ways, and probably all the ways that are required by law in your jurisdiction.

Learn more: https://about.meta.com/actions/safety/audiences/law/guidelin...

Yes, WA messages are supposed to be e2e encrypted. Unless end-to-end encryption is prohibited by law in your jurisdiction, I don't see how that question is relevant in this context.


I find it funny that they claim to be “end-to-end” at least once they have censored one of my messages.


The receiving end shared your message with the administrators? E2e doesn't mean you aren't allowed to do what you want with the messages you receive, they are yours.


Nope, it didn't even arrive on their end, it prevented me from sending the message and said I wasn't allowed to send that. So they are pre screening your messages before you send them.


For some trivial client side filtering that still makes it e2e encrypted.


isn't meta only end to end encrypted in the most original definition in so much that it is encrypted to each hop. but it's not end to end encrypted like signal.. ie meta can snoop all day


If a service provider can see plain text for a messaging app between the END users, that is NOT end-to-end encryption, by any valid definition. Service providers do not get to be one of the ends in E2EE, no matter what 2019 Zoom was claiming in their marketing. That's just lying.


Probably government portals that Meta provides


What has E2EE got to do with it? If you catch someone who sent CP you can open their phone and read their messages. Then you can tell Meta which ones to delete and they can do it from the metadata alone.


> Isn't Whatsapp supposed to be end-to-end encrypted?

It is supposedly end-to-end encrypted. And in a shallow way. Also the app is closed source and you can't develop your own.

It's basically end-to-end-trust-me-bro-level encrypted.


I'm more disturbed by the fact that on HN we have 0 devs confirming or denying this thing about FBs internals wrt encryption. We know there are many devs that work there that are also HN users. But I've yet to see one of them chime in on this discussion.

That should scare a lot of us.


I find it pretty ridiculous to assume that any dev would comment on the inner workings of their employers software in any way beyond what is publicly available anyway. I certainly wouldn't.


Why not? If I think my employer is doing something unethical, I certainly would. That would be the moral thing to do.

This tells me most of the people implementing this are either too-scared of the consequences, or they think what they're implementing is ethical and/or the right thing to do. Again, both are scary thoughts we should be highly concerned about in a healthy society that talks about these things.

One other potential explanation: FB and these large behemoths have compartmentalized the implementations of these features so much that no one can speak authoritatively about it's encryption.


You are talking about a company whose primary business idea it is to lock up as much of the world's information as possible behind their login.

The secondary business idea it to tie their users logins to their real world identities, to the point of repeatedly locking out users who they live under threat and refuse to disclose their real name.


> That would be the moral thing to do.

The simplest explanation: when peope start at facebook/meta they leave their ethics at the door on the first day in the role.

It’s cynical, but does explain a lot: many people will pick the fat paycheque over their ethics any day, particularly in the US (where money is king)


It’d be quicker just to say when Facebook did something ethical.


There's not really much point in trying to convince flat earthers of the truth.


I'm not sure I understand the analogy. In your analogy, who are the flat-earthers?


don’t you have an answer now?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: