Researchers discover security vulnerability in WhatsApp
Scope and Severity of the “Vulnerability”
- Many commenters argue this is mostly enumeration of existing, intentionally public data (phone number → WhatsApp account + public profile), not a classic “data breach.”
- Others counter that the scale enabled by zero/weak rate limiting (thousands of lookups per second, billions of numbers) is precisely what turns a feature into a vulnerability.
- There’s disagreement over terminology: some reserve “vulnerability” for unintended flaws or code bugs; others include obviously risky design and missing safeguards (like rate limiting).
Threat Models and Real-World Risk
- One camp downplays the danger: phone numbers were never secret; anyone could already check if a given number has WhatsApp, and telcos/governments in authoritarian states already see everything.
- Another highlights life-safety implications: being able to systematically identify WhatsApp users in countries where it’s banned could aid repression; they frame this as crossing from InfoSec to OpSec.
- Counterargument: WhatsApp is a civilian app, not designed for military/underground use; if using it is jailable, you shouldn’t trust Meta at all.
Technical Aspects and Data Exposed
- The exploited endpoint is WhatsApp’s contact discovery: “does this number have an account, and what public profile data is visible?”
- Researchers report ~7,000 queries/second from a single session, enabling ~3.5B account confirmations and collection of public profile photos/status where set.
- Some mention cryptographic key reuse and the ability to correlate identities when users change numbers as a more interesting long-term issue.
Privacy Expectations and Phone Numbers as Identifiers
- Historically, phone numbers and addresses were often publicly listed; some participants recall paying extra for an unlisted number.
- Today, numbers function as persistent identifiers and 2FA / recovery keys, so reassignment and leakage have greater consequences.
- Debate over whether confirming account existence for a single number is already a privacy issue, especially for sensitive services, and how aggregating such confirmations across multiple services could be abused.
Centralization and Alternatives
- Several comments see this as yet another illustration of risks from centralizing global messaging under one corporate actor.
- Alternatives and mitigations discussed:
- Using schemes like private set intersection or Bluesky’s contact-import RFC to reduce enumeration risk.
- Moving away from phone numbers as primary identifiers to random, high-entropy IDs.
- Decentralized or privacy-focused messengers (Matrix, SimpleX, Threema, etc.) as preferable models.