A revived EU proposal backed by 19 member states could force apps like WhatsApp and Signal to scan encrypted messages, raising alarm over privacy and surveillance.
Can anyone confirm this? I thought it was e2e but meta sill could read content since they had permission to monitor the app on the device including contents.
The security of E2E relies on the endpoints. Meta owns the closed source endpoints so if they want access, there is nothing you can do (remember client-side scanning?). The moderation functionality in Whatsapp already breaks E2E. That feature thankfully doesn’t exist in Signal.
Also I’m surprised no one ever mentions metadata. That is absolutely not private with WA, and it’s a gold mine for Meta.
Closed source software from a notoriously corrupt company and it’s encryption keys are not ever in users’ control. You should assume apps like that are already backdoored. Matrix/XMPP/Briar/SimpleX is probably the way to go. Either that or manage your own encryption methods, but take into account other info such as your contacts list can also be used against you.
I’m confused. Even WA has full encryptrion nowadays, which means they themselves don’t know what’s in the messages. How is this supposed to even work?
Can anyone confirm this? I thought it was e2e but meta sill could read content since they had permission to monitor the app on the device including contents.
The security of E2E relies on the endpoints. Meta owns the closed source endpoints so if they want access, there is nothing you can do (remember client-side scanning?). The moderation functionality in Whatsapp already breaks E2E. That feature thankfully doesn’t exist in Signal.
Also I’m surprised no one ever mentions metadata. That is absolutely not private with WA, and it’s a gold mine for Meta.
Closed source software from a notoriously corrupt company and it’s encryption keys are not ever in users’ control. You should assume apps like that are already backdoored. Matrix/XMPP/Briar/SimpleX is probably the way to go. Either that or manage your own encryption methods, but take into account other info such as your contacts list can also be used against you.