Comment by cosmicgadget

Comment by cosmicgadget 19 hours ago

54 replies

> “We look forward to moving forward with those claims and note WhatsApp’s denials have all been carefully worded in a way that stops short of denying the central allegation in the complaint – that Meta has the ability to read WhatsApp messages, regardless of its claims about end-to-end encryption.”

My money is on the chats being end to end encrypted and separately uploaded to Facebook.

gruez 18 hours ago

>being end to end encrypted and separately uploaded to Facebook

That's a cute loophole you thought up, but whatsapp's marketing is pretty unequivocal that they can't read your messages.

>With end-to-end encryption on WhatsApp, your personal messages and calls are secured with a lock. Only you and the person you're talking to can read or listen to them, and no one else, not even WhatsApp

https://www.whatsapp.com/

That's not to say it's impossible that they are secretly uploading your messages, but the implication that they could be secretly doing so while not running afoul of their own claims because of cute word games, is outright false.

  • blibble 18 hours ago

    > but whatsapp's marketing is pretty unequivocal that they can't read your messages.

    well that's alright then

    facebook's marketing and executives have always been completely above board and completely honest

    • gruez 18 hours ago

      Read the rest of my comment?

      >That's not to say it's impossible that they are secretly uploading your messages, but the implication that they could be secretly doing so while not running afoul of their own claims because of cute word games, is outright false.

  • codyb 18 hours ago

    The thing is, if they were uploading your messages, then they'd want to do something with the data.

    And humans aren't great at keeping secrets.

    So, if the claim is that there's a bunch of data, but everyone who is using it to great gain is completely and totally mum about it, and no one else has ever thought to question where certain inferences were coming from, and no employee ever questioned any API calls or database usage or traffic graph.

    Well, that's just about the best damn kept secret in town and I hope my messages are as safe!

    And I'm no fan of Meta...

    • 3eb7988a1663 17 hours ago

      Where were the Facebook whistleblowers about the numerous IOS/Android gaps that let the company gain more information than they were to supposed to see? Malicious VPNs, scanning other installed mobile applications, whatever. As far as I know, the big indictments have been found from the outside.

      • gruez 16 hours ago

        >Malicious VPNs

        AFAIK that was a separate app, and it was pretty clear that it was MITMing your connections. It's not any different than say, complaining about how there weren't any whistleblowers for fortinet (who sell enterprise firewalls).

        >scanning other installed mobile applications

        Source?

  • IcyWindows 13 hours ago

    I'm not saying they are sending the content back, but WhatsApp has to read your message or it couldn't display it, so I don't even know exactly what that particular claim means?

    They most likely mean their service or their employees, but this appears to be marketing fluff and not an enforceable statement.

  • netsharc 18 hours ago

    I wonder if keyword/sentiment extraction on the user's device counts as reading "by WhatsApp"...

    There's the conspiracy theory about mentioning a product near the phone and then getting ads for it (which I don't believe), but I feel like I've mentioned products on WhatsApp chats with friends and then got an ad for them on Instagram sometime after.

    Also claiming "no one else can read it" is a bit brave, what if the user's phone has spyware that takes screenshots of WhatsApp... (Technically of course it's outside of their scope to protect against this, but try explaining that to a judge who sees their claim and the reality)

  • cosmicgadget 18 hours ago

    Are messages and calls data at rest or data in motion? The UI lock feature refers to 'chats' which could be their term for data at rest.

    I wonder what the eula says.

  • a0123 13 hours ago

    > That's a cute loophole you thought up, but whatsapp's marketing is pretty unequivocal that they can't read your messages.

    If Facebook says it, then... Sorted!

  • blindriver 15 hours ago

    "We can't read your messages! They are encrypted on disk and we don't store the keys!"

    "What encryption do you use?"

    "DES."

  • conscion 16 hours ago

    My guess is that they are end-to-end encrypted. And because of Facebook's scale that they're able to probabilisticly guess at what's in the encrypted messages (e.g.a message with X hash has Y probability of containing the word "shoes")

    • ghurtado 13 hours ago

      > they're able to probabilisticly guess at

      That's not how encryption works at all. At least not any encryption used in the last 100 years.

      You'd probably have to go all the way back to the encryption methods of the Roman empire for that statement to make sense

    • stefs 14 hours ago

      That would still be very close to educated mind reading

varenc 19 hours ago

If this was happening en-masse, wouldn't this be discovered by the many people reverse engineering WhatsApp? Reverse engineering is hard sophisticated work, but given how popular WhatsApp is plenty of independent security researchers are doing it. I'm quite skeptical Meta could hide some malicious code in WhatsApp that's breaking the E2EE without it being discovered.

  • solenoid0937 18 hours ago

    It would be trivial to discover and would be pretty big news in the security community.

    I'd wager most of these comments are from nontechnical people, or technical people that are very far removed from security.

    • cosmicgadget 17 hours ago

      I'm technical and work in security. Since it is trivial, please explain. Ideally not using a strawman like "well just run strings and look for uploadPlaintextChatsToServer()".

      • solenoid0937 17 hours ago

        I don't see why standard RE techniques (DBI/Frida + MITM) wouldn't work, do you?

        WhatsApp is constantly RE'd because it'd be incredibly valuable to discover gaps in its security posture, the community would find any exfil here.

  • palata 18 hours ago

    Before that, Meta employees would know about it. Pretty convinced that someone would leak it.

  • beagle3 13 hours ago

    This was happening en masse, perhaps still does - the cloud backup was unencrypted. Originally it was encrypted. Then, one day, Google stopped counting it towards your storage quota, but it became unencrypted. But even before that, Meta had the encryption keys (and probably still does).

    When you get a new phone, all you need is your phone number to retrieve the past chats from backup; nothing else. That proves, regardless of specifics, that Meta can read your chats - they can send it to any new phone.

    So it doesn’t really matter that it is E2EE in transit - they just have to wait for the daily backup, and they can read it then.

  • cosmicgadget 18 hours ago

    Well they wouldn't be breaking e2ee, they'd be breaking the implicit promise of e2ee. The chats are still inaccessible to intermediaries, they'd just be stored elsewhere. Like Apple and Microsoft do.

    I am not familiar with the state of app RE. But between code obfuscators and the difficulty of distinguishing between 'normal' phone home data and user chats when doing static analysis... I'd say it's not out of the question.

matthewdgreen 18 hours ago

I really doubt this. Any such upload would be visible inside the WhatsApp application, which would make it the world's most exciting (and relatively straightforward) RE project. You can even start with a Java app, so it's extra easy.

  • cosmicgadget 18 hours ago

    If you claim REing a flagship FAANG application is "extra easy", either they need to be laughed out of the room or you do.

    • gruez 16 hours ago

      Does FAANG apps have antidebug or code obfuscation? At least for google their apps are pretty lightly protected. The maximum extent of obfuscation is the standard compilation/optimization process that most apps go through (eg. r8 or proguard).

    • quesera 18 hours ago

      Reverse engineering is easy when the source code is available. :)

      The difference between source code in a high-level language, and AArch64 machine language, is surmountable. The effort is made easier if you can focus on calls to the crypto and networking libraries.

      • cosmicgadget 18 hours ago

        The source is available?

        Understanding program flow is very different from understanding the composition of data passing though the program.

random3 19 hours ago

That’s because they have such a good track record wrt to privacy? https://www.docketalarm.com/cases/California_Northern_Distri...

steve_taylor 18 hours ago

> My money is on the chats being end to end encrypted and separately uploaded to Facebook.

If governments of various countries have compelled Meta to provide a backdoor and also required non-disclosure (e.g. a TCN secretly issued to Meta under Australia's Assistance and Access Act), this is how I imagined they would do it. It technically doesn't break encryption as the receiving device receives the encrypted message.

guerrilla 19 hours ago

> My money is on the chats being end to end encrypted and separately uploaded to Facebook.

This is what I've suspected for a long time. I bet that's it. They can already read both ends, no need to b0rk the encryption. It's just them doing their job to protect you from fourth parties, not from themselves.

FabHK 18 hours ago

It should be detectable if it sends twice the data.

  • rurban 15 hours ago

    It encrypts it to all the keys with the phone number registered for that user. Because users are switching phones, but keep their number. But each new WhatsApp app gets a new private key, the old key is not shared. This feature was added later, so the old WhatsApp devs wouldn't know.

    So it would be trivial to encrypt to the NSA key also, as done on Windows.

RajT88 15 hours ago

Facebook messenger similarly claims to be end to end encrypted, and yet if it thinks you are sending a link to a pirate site, it "fails to send". I imagine there are a great many blacklisted sites which they shadow block, despite "not being able to read your messages".

My pet conspiracy theory is that the "backup code" which "restores" encrypted messages is there to annoy you into installing the app instead of chatting on the web.

  • loeg 14 hours ago

    The client probably just downloads a blacklist of banned domains. That doesn't mean messages that are sent are not E2E encrypted.

    • RajT88 14 hours ago

      Facebook has lost any benefit of doubt, imo.

      • loeg 13 hours ago

        Baseless conspiracy theories just make yourself dumber; it doesn’t punish Facebook.