New WhatsApp Warning As Encryption Is ‘Bypassed’ (2024)

WhatsApp users have suddenly been warned that its security has been seriously compromised, and that a flaw in its encryption may have exposed their data. And separately, Elon Musk has also just publicly attacked WhatsApp’s security and data practices. So how worried should those 2 billion people be right now, and is this really a reason to quit WhatsApp and switch to something else?

In the world of secure messaging, perception can be everything, That’s why there was such a strong reaction from Signal to Telegram’s recent attack, and it’s why headlines suggesting that “WhatsApp Engineers Fear Encryption Flaw Exposes User Data,” now has many users seriously concerned.

Is this true? Has there really been a breach in the fabled encryption protecting all those billions of daily messages and calls? In short, no. This is something else—but it has worrying implications of its own. And in reality, it’s an issue that has lurked beneath WhatsApp’s glossy surface all along.

ForbesSamsung Issues Delayed Security Update To Millions More Galaxy UsersBy Zak Doffman

There are two separate issues at play here. But the thing they have in common is metadata—the who contacted who, when, and from where of messaging. This data is not encrypted. It can be captured and stored by the platform, should it want to, and it can be monitored at a network level by governments or carriers with the right access. Think of this as vacuuming up staggering amounts of metadata from everyone, and then searching for patterns—the world of intelligence communications agencies.

MORE FOR YOU

Trump Trial Prosecutor Ends Closing Argument After Nearly 5 Hours Jury Instructions Set For Wednesday
Gas Explosion In Downtown Youngstown Ohio Injures At Least 7
Take Advantage Of The Best Memorial Day Laptop Sales Still Live

The Intercept, which broke this story, is closer to the truth when it reports “an undisclosed WhatsApp vulnerability lets governments see who you message,” referring to the latter of those two issues—network level monitoring or traffic analysis. “WhatsApp should mitigate the ongoing exploitation of traffic analysis vulnerabilities” it says WhatsApp’s engineers told its management, warning agencies are “bypassing our encryption... making it possible for nation states to determine who is talking to who.”

But hang on—we already know WhatsApp can collect all this information. It says as much in its published privacy policy, that it collects “information about your activity (including how you use our Services), how you interact with others using our Services (including when you search for and interact with a business), and the time, frequency, and duration of your activities.” And also that “even if you do not choose to use our precise location-related features, we use IP addresses and other information like phone number area codes, to estimate your general location.”

That is the first of those two issues. But if it's WhatsApp doing the collecting, then it can protect its users. That protection falls away if the analysis is outside its control. “Our at-risk users need robust and viable protections against traffic analysis,” the engineers warned.

But words are important here. The encryption is not flawed and has not been compromised. Metadata is not encrypted—at least not in the end-to-end way that we think of WhatsApp’s encryption. And that’s why WhatsApp can capture and provide such information if lawfully requested by a government agency.

“WhatsApp does not store message logs once the messages are delivered or transaction logs of such delivered messages,” it says—but “in order to comply with a valid legal request... WhatsApp may start collecting message logs and call logs for a particular user indicating who the communication was to or from, the time it was transmitted and from which IP address, and the type of communication.”

And as ESET’s Jake Moore warns, “with pressure from governments around the world to have more exposure to intelligence and police evidence, this is potentially where Meta have agreed to find some sort of middle ground. However, although the content of these messages remains private, it is worrying that so much other sensitive data can still be viewed and analysed.”

This story isn’t about the collection of that data, it’s about how it’s collected and shared—and by who.

With perfect timing, just as this WhatsApp metadata story has been doing the rounds, Telsa/Starlink CEO Elon Musk, fresh from his recent attack on Signal, has now warned his 185 million X follows about WhatsApp’s metadata mining practices. “WhatsApp exports your user data every night,” he posted. “Some people still think it is secure.”

Musk’s comments were in response to an X post suggesting “WhatsApp exports user data nightly, which is analyzed and used for targeted advertising, making users the product, not the customer.” Again, this risks confusing content security, for which WhatsApp is known, and data harvesting and analysis, for which Meta is known. This has always been WhatsApp’s Achilles’ heel.

But the optics won’t help WhatsApp, especially given the other story running in parallel.

There has been no claim that WhatsApp content has been compromised, and that means its encryption remains intact. We know there is a risk of endpoint (device) compromise to access content, but thus far any nation state that has broken the transmission crypto is staying very quiet about it.

Let’s assume the protocol—which is a tweak on Signal’s—remains intact.

This is about metadata. And that’s a matter of data storage and policy. WhatsApp says it can store metadata and Signal, for example, says it cannot. That’s one of the reasons why Signal is more secure.

But when it comes to network traffic analysis, the stakes are different. The implication here is that network monitoring at a massive scale can analyze IP addresses and other identifiers to work out traffic patterns between individuals without breaching the core encryption.

This in itself is nothing new. Relationship maps that implicate so-called clean skins because of the people they communicate with—if you message terrorists or criminals, you’re also probably worth a look. Such data processing also enables communication fingerprinting. It’s possible, for example, to tie a burner phone to an individual based on the unique comms patterns—if you can capture the metadata.

This is a serious concern. As The Economist reported also this week, “it is dangerously easy to hack the world’s phones...a system at the heart of global telecommunications is woefully insecure.” This refers to SS7, the appallingly insecure and archaic data exchange system connecting phone networks. And while this exposes unencrypted comms to full intercept, it also enables metadata to be captured at scale.

The way it’s written, this latest WhatsApp story suggests that government agencies have found a way to siphon or intercept WhatsApp metadata and pattern analyze this at scale. Perhaps in a way that’s more precise than just the “hoovering-up data” approach. One further allegation is that this has compromised those in Gaza and formed part of an Israeli target identification platform.

In reality, this is most likely just a clever application of age-old network data collection and analysis, using more powerful processing. Meta told The Intercept “WhatsApp has no backdoors and we have no evidence of vulnerabilities in how WhatsApp works.” And nothing in this story suggests that’s untrue.

Responding to The Intercept on X, WhatsApp’s boss Will Cathcart said that “there is no evidence of a vulnerability in WhatsApp and this article risks a ton of confusion for people who rely on end-to-end encryption... We debate possible or emerging threats internally - sometimes quite energetically - because that’s how we find ways to add even more security to WhatsApp.”

But as The Intercept’s Sam Biddle replied to Cathcart, “Meta appears to be taking the position that this is not a vulnerability in WhatsApp. I will now quote verbatim from their internal assessment of the situation: ‘WhatsApp should mitigate the ongoing exploitation of traffic analysis vulnerabilities.’”

So, let’s keep this stupidly simple. If you have reason to fear an agency of any sort tracking you, your location or your contacts, then probably don’t use a platform owned and operated by Meta, aka Facebook. “Other available privacy focused messaging apps offer ironclad protection which can be used by those favoring privacy over convenience,” Moore points out.

ForbesGoogle Chrome Under Attack-Do This One Thing NowBy Zak Doffman

So, should you be alarmed? Only if you have more than your content to worry about. And if that’s the case, then yes, you should switch to something else. WhatsApp won’t comment on the claim that it should do more to “mitigate” ongoing traffic analysis, and so millions of users with specific concerns should consider other options.

You can take actions to protect against traffic analysis to an extent—it’s a crude collection technique. Shield your IP address, change devices fairly regularly, be very wary of groups when you can't personally attest to the identities of all members, turn off all location tracking on your phone.

If you don’t take such steps, as Moore says, “communication and location data may seem futile but this can be merged together with other available information to build a bigger profile picture. Moreover, if this data is ever compromised, it can cause further damage to those involved so it is vital it is protected.”

I approached Meta for comment, and was directed to Cathcart’s post on X.

Updated 05/25 with Elon Musk’s comments.

New WhatsApp Warning As Encryption Is ‘Bypassed’ (2024)

FAQs

New WhatsApp Warning As Encryption Is ‘Bypassed’? ›

The encryption is not flawed and has not been compromised. Metadata is not encrypted—at least not in the end-to-end way that we think of WhatsApp's encryption. And that's why WhatsApp can capture and provide such information if lawfully requested by a government agency.

Is WhatsApp really end-to-end encrypted? ›

WhatsApp uses end-to-end encryption, which means nobody except the sender and recipient can read messages. Other chat apps like Facebook Messenger and Telegram don't use end-to-end encryption by default.

How do you check if my WhatsApp is encrypted? ›

To verify that an individual chat is end-to-end encrypted:
  1. Open the chat.
  2. Tap the contact's name to open the contact info screen.
  3. Tap Encryption to view the QR code and 60-digit number.

Is every message on WhatsApp automatically encrypted? ›

WhatsApp provides end-to-end encryption for all personal messages that you send and receive. This makes sure that only you and the person you're talking to can read or listen to them. With end-to-end encrypted backup, you can add that same layer of protection to your iCloud and Google Account backups.

How do I turn off end-to-end encryption on WhatsApp? ›

To turn off end-to-end encrypted backups:
  1. Go to Settings > Chats > Chat Backup.
  2. Tap End-to-end encrypted backup.
  3. Tap Turn off, then enter your password or 64-digit encryption key.
  4. Tap Turn off again to confirm.

What happens if I turn off end-to-end encryption? ›

Turning off encryption will allow all of⁣ your‌ phone's features to work as intended. Faster Phone Performance: With a smartphone's storage encrypted, the‍ device ​can take a few seconds longer to perform functions.

What is the disadvantage of end-to-end encryption on WhatsApp? ›

Disadvantages of end-to-end encryption

The security that end-to-end privacy offers might be limited if a third party gets physical access to the device at either end of the transmission — not only can they read existing messages, but also send new ones.

Why can't I verify end-to-end encryption on WhatsApp? ›

All WhatsApp chats are encrypted by default, but you have to manually scan a QR code or compare a 60-digit numeric code if you want to verify encryption in a conversation.

Can police recover encrypted WhatsApp messages? ›

WhatsApp messages are “end-to-end encrypted” which means that the police cannot easily intercept them. End-to-end encryption is a security method that keeps your communications secure.

Can someone read WhatsApp messages from another phone? ›

Yes, you can see WhatsApp messages on another device: linking another device to your phone, using a WhatsApp monitoring app, or restoring the Whatsapp Backup to another device. Q 2. Can Someone Read My WhatsApp Messages without My Phone? Yes, if they have access to your WhatsApp local or cloud backup.

Are deleted WhatsApp messages gone forever? ›

You can delete messages just for yourself or request that messages be deleted for everyone. If you want to edit a message instead, you can for up to 15 minutes after sending. When you delete a message, there's no way to get it back unless you've included the message in a backup.

Is WhatsApp safer than texting? ›

WhatsApp FAQs

Since WhatsApp uses end-to-end encryption, it may be safer than texting if you adjust the privacy settings to the most secure settings.

Can someone read WhatsApp encrypted messages? ›

Yes, messages and calls on WhatsApp are 100% encrypted. Nobody else, including your ISP or the WhatsApp platform, can access your messages. Moreover, you can also encrypt your backup files so that even Google Drive can't access them.

Can WhatsApp be hacked with end-to-end encryption? ›

However, it's important to note that end-to-end encryption does not protect against all security threats. For example, an attacker who has access to the device of the sender or recipient can still read the messages or listen in on the calls.

Should I turn on end-to-end encryption on WhatsApp? ›

Being end-to-end encrypted by default means nobody at Meta can read, or mine data from, the content of the messages you send. All texts, photos, videos, voice messages, documents, status updates, and calls are encrypted on WhatsApp, and only the people you send them to can access them.

Why is my WhatsApp showing end-to-end encryption? ›

WhatsApp has started displaying if the specific chat is end-to-end encrypted by showing the same under the user name inside a chat. This feature will enable users to understand if a specific chat is encrypted or not, and the caption appears along with a padlock icon.

How private are WhatsApp messages? ›

Again, these personal chats are end-to-end encrypted so we can't see their content. You can set your messages to disappear: For additional privacy, you can choose to set your messages to disappear from chats after you send them. Learn more in this Help Center article.

Can the government read WhatsApp messages? ›

Even though the contents of WhatsApp communications are unreadable, the assessment shows how governments can use their access to internet infrastructure to monitor when and where encrypted communications are occurring, like observing a mail carrier ferrying a sealed envelope.

Is WhatsApp safe to send private pictures? ›

So, users of iPhones and Android devices have a bit more protection from malware. Still, WhatsApp may not catch some malware that can infect your phone and send messages without your consent.

Top Articles
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 6075

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.