US has investigated claims WhatsApp chats aren't private
Trust in Meta and Governments
- Many commenters treat it as obvious that a Meta-owned messenger should not be trusted with privacy, citing its business model and past behavior.
- Others argue distrust has become reflexive and conspiratorial: extraordinary claims of secret backdoors need technical evidence, not just vibes.
- Several note that any large provider, in most countries, can be legally compelled to assist governments, so jurisdiction alone doesn’t guarantee privacy.
End-to-End Encryption vs Client Control
- Repeated clarification: strong transport E2EE can be mathematically sound while still being defeated at the endpoints.
- Core issue: the client app and OS are closed-source and auto-updated. If Meta ships a malicious client or subtly exfiltrates keys, users can’t reliably detect it.
- Several point out that “E2EE” only guarantees intermediaries can’t read traffic; it does not mean the service operator can’t compromise its own endpoints.
Backups, Key Management, and UX Tradeoffs
- A major suspected weak point is backups and multi-device chat history:
- If you can restore WhatsApp history on a new device with minimal secrets, someone else can too.
- Some say backup keys are or were effectively under Meta/Apple/Google control; others say newer designs derive keys from user passwords or keychains.
- Discussion of PIN-based encryption (e.g., Messenger): short numeric PINs need HSM-based rate limiting; alphanumeric secrets are safer but users rarely choose them.
- Several argue that truly user-controlled keys create terrible UX (lost messages on phone loss), so mainstream products gravitate to server-side key control.
Reverse Engineering and Independent Audits
- Multiple commenters emphasize that WhatsApp’s crypto layer is based on the Signal protocol and has been extensively reverse engineered and formally analyzed; no direct backdoor has been found there.
- A cryptographic paper on WhatsApp’s protocol is cited: main structural concern is that servers control group membership and key distribution, not that they see plaintext.
- Counterpoint: audits focused on the crypto core, not full app behavior or dynamic code loading. A subtle key-exfiltration path or secondary upload channel could, in theory, evade such audits.
Speculation, Metadata, and Alternative Messengers
- Some hypothesize plaintext could be uploaded separately (e.g., for abuse reporting, AI features, or backups) while marketing still leans on the E2EE label.
- Others note that metadata alone (who, when, how often, correlated with web and app activity) is powerful for surveillance and advertising even without content.
- Comparisons: Signal is widely viewed as more trustworthy (open source, reproducible builds, stricter design); Telegram is criticized for non-default and limited E2EE; iMessage/Apple and others are cited as having backup-related loopholes.
Views on the US Investigation / Lawsuit
- Several see the lawsuit and investigation as likely to be a “nothingburger” or fishing expedition, given current public evidence and expert skepticism.
- Others stress that official denials are carefully worded and don’t definitively preclude technical capability; they want stronger, enforceable statements or ongoing independent audits.