And if so, why exactly? It says it’s end-to-end encrypted. The metadata isn’t. But what is metadata and is it bad that it’s not? Are there any other problematic things?

I think I have a few answers for these questions, but I was wondering if anyone else has good answers/explanations/links to share where I can inform myself more.

  • ɐɥO@lemmy.ohaa.xyz
    link
    fedilink
    arrow-up
    71
    arrow-down
    1
    ·
    edit-2
    9 months ago

    It says it’s end-to-end encrypted.

    Whatsapp is closed source and made by a advertising company. Wouldnt really count on that

    Edit: Formatting

    • folkrav@lemmy.world
      link
      fedilink
      arrow-up
      14
      arrow-down
      2
      ·
      edit-2
      9 months ago

      Saying they do E2EE but not doing it would be a literal massive scale fraud. Can’t say I put Meta past those behaviors to be fair though lol

      But as the other guy said, metadata is already a lot.

      • BitSound@lemmy.world
        link
        fedilink
        arrow-up
        14
        arrow-down
        1
        ·
        9 months ago

        They would just say that they have a different definition of E2EE, or quietly opt you out of it and bury something in their terms of service that says you agree to that. You might even win in court, but that will be a wrist slap years later if at all.

        • SokathHisEyesOpen@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          9 months ago

          No single individual will beat a corporation as large as Facebook in a court battle. You could have all the evidence in the world and they’ll still beat you in court and destroy your life in the process. It took a massive class action lawsuit to hold them accountable for the Cambridge Analytica case, and the punishment was still pennies to them.

          Look at the DuPont case. There was abundant evidence that they were knowingly poisoning the planet, and giving people cancer, and they still managed to drag that case on for 30 years before a judgement. In the end they were fined less than 3% of their profit from a single year. That was their punishment for poisoning 99% of all life on planet earth, knowingly killing factory workers, bribing government agencies, lying, cheating, and just all around being evil fucks. 3% of their profit from a single year.

    • meseek #2982@lemmy.ca
      link
      fedilink
      arrow-up
      11
      arrow-down
      2
      ·
      9 months ago

      “We just capture what you wrote and to whom before it gets encrypted and sent; we see nothing wrong with that” —Mark Zuckerberg, probably

      • whale@lemm.ee
        link
        fedilink
        arrow-up
        11
        arrow-down
        1
        ·
        9 months ago

        “They trust me. Dumb fucks” - Mark Zuckerberg, actually

    • miss_brainfart@lemmy.ml
      link
      fedilink
      arrow-up
      8
      ·
      edit-2
      9 months ago

      They don’t really need the actual contents of your messages if they have the associated metadata, since it is not encrypted, and provides them with plenty of information.

      So idk, I honestly don’t see why I shouldn’t believe them. Don’t get me wrong though, I fully support the scepticism.

      • bouh@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        9 months ago

        All they need is the encryption key for the message, and it’s not the message itself.

        • BearOfaTime@lemm.ee
          link
          fedilink
          arrow-up
          1
          ·
          9 months ago

          If they keys are held by them, they have access.

          When you log into another device, if all your chat history shows up, then their servers have your encryption key.

    • MiddledAgedGuy@beehaw.org
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      This is what I came to express as well. Unless the software is open source, both client and server, what they say is unverifiable and it’s safest to assume it’s false. Moreover, the owning company has a verifiable and well known history of explicitly acting against user privacy. There is no reason to trust them and every reason not to.

  • amanneedsamaid@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    27
    arrow-down
    1
    ·
    edit-2
    9 months ago

    Metadata is all the content of a message besides the actual text content of the message (i.e. what you type). Examples would be the date and time it is sent, what users these messages were sent to / from, and the IP addresses of both parties. (The availability of metadata varies from messenger to messenger).

    I like this example: If you only text your Aunt Sally, who lives in Alaska, twice per year to wish her a happy birthday and Christmas, just by looking at the metadata someone could infer the meaning of your messages, as well as your relationship to the person you’re messaging. To a point this is true about any messages you sent.

    As for Whatsapp specifically, it being end-to-end doesn’t really matter imo, as the application is not open source and is owned by an advertising / social media company. As long as the code is closed source, you cannot be sure:

    1. That your messages are encrypted at all
    2. That your encryption keys are kept on-device, and not plainly available to a centralized party
    3. That the encryption the application is using is securely implemented

    At least for applications handling truly sensitive information (for the average person only their messenger and browser), you should be using open source software. The easiest recommendations I can make are:

    1. Browsers: Firefox, Thorium, Brave
    2. Messengers: Signal, SimpleX Chat, XMPP

    Anyways, I hope this was a satisfactory answer.

    • Azzu@lemm.eeOP
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      9 months ago

      What use is this knowledge through metadata to them? Let’s say I have no Facebook account and no other apps by Meta. There are no ads within WhatsApp. What do they gain by having this data about me?

      • noodlejetski@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        9 months ago

        they can sell the information tied to your phone number or IP address to other companies, so they in turn now what ads to bombard you with.

    • BraveSirZaphod@kbin.social
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      edit-2
      9 months ago

      That your messages are encrypted at all
      That your encryption keys are kept on-device, and not plainly available to a centralized party
      That the encryption the application is using is securely implemented

      This is true, but something that should be noted is that, to my knowledge, no law enforcement agency has ever received the supposedly encrypted content of WhatsApp messages. Facebook Messenger messages are not E2E encrypted by default, and there have been several stories about Facebook being served a warrant for message content and providing it. This has, as I understand, not occurred for WhatsApp messages. It is possible, of course, that they do have some kind of access and only provide it to very high-level intelligence agencies, but there’s no direct evidence of that.

      I would personally say that it’s more likely than not that WhatsApp message content is legitimately private, but I’d also agree that you should use something like Signal if you’re genuinely concerned about this.

      • bouh@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        9 months ago

        They would better hide those evidences as best as they can, or they would lose a useful source of informations.

        That’s the whole game of intelligence: to be a step ahead of the opponent, it must believe its safe so you can steal useful informations. As soon as the breach is discovered, it ceases to be useful.

        • BraveSirZaphod@kbin.social
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          9 months ago

          Sure. My point is that, as far as I believe anyone is currently aware, there is no evidence that any law enforcement agency has ever accessed the content of encrypted WhatsApp messages. That does not mean that it has never happened either, but anyone positively claiming so is doing it without actual evidence, which is something we should probably avoid doing.

    • whale@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      9 months ago

      Metadata includes:

      1. Who
      2. When
      3. Where
      4. More?

      For example, if we look at Whatsapp:

      1. We know the sender and recipient(s) by phone number
      2. Time and date of every message and how frequently
      3. IP address (relative location)
      4. Every phone number is probably tied to a Facebook identity, which includes online and/or offline information about you and all your friends

      And that’s just if we take Facebook at its word

    • Azzu@lemm.eeOP
      link
      fedilink
      arrow-up
      1
      ·
      9 months ago

      How do I know other browsers/messengers actually include the code that is published when they arrive on my phone? Wouldn’t it be possible to simply add tracking/malicious code outside of the open-source repository, build an APK from it and put that on the Play Store instead of the “clean” code on the repository?

    • Azzu@lemm.eeOP
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      Thank you, but I’m looking for actual arguments that would sway someone that is trying to come to a rational conclusion. “The reputation of the company is bad” is of course valid evidence, but it would be much more interesting to know what Facebook actually gains from having users on WhatsApp.

      • Free Palestine 🇵🇸@sh.itjust.works
        link
        fedilink
        arrow-up
        2
        ·
        9 months ago

        First, it is very likely that the WhatsApp encryption is compromised, it definitely shouldn’t be trusted, as it is completely proprietary and thus not transparent to users and independent auditors. Also, unlike Signal, WhatsApp doesn’t encrypt any metadata. The biggest source of WhatsApp user data for Facebook though are address books. When you grant WhatsApp permissions to access your contacts, that data is sent to Facebook servers unencrypted. That way, Facebook can see the names and phone numbers of all of your contacts. This is not just bad for you, it’s also bad for everyone whose phone number you saved in your address book, their data is sent to Facebook, even if they don’t use any Facebook services themselves. Also, when you have WhatsApp or any app installed on your phone, it by default has access to many things that you can’t control or restrict. For example, it can access some unique device identifiers and look at stuff like the list of apps you have installed on your phone or access sensors like the gyroscope and accelerometer which can absolutely be used to track you. It’s better to keep shady apps like those made by Facebook, Google, Amazon, Microsoft or other surveillance corporations off your devices. Use FOSS alternatives with a proven track record like Signal if they are available.

        • Azzu@lemm.eeOP
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          9 months ago

          I understand they have access to all this information you listed, but what do they gain from that if I don’t use any (other) Facebook services? Normally, I understand that it allows for better ad targeting, but WhatsApp does not have ads, and if I don’t use any other Meta services that actually serve ads, how could this info being out be a problem for me?

          • Free Palestine 🇵🇸@sh.itjust.works
            link
            fedilink
            arrow-up
            2
            ·
            9 months ago

            Facebook has your address book, so they have the phone numbers and names of all of your friends, work colleagues, family members and other people you happen to know. They can see your entire social graph. This kind of metadata is extremely valuable. If you just have the phone number of someone in your phone book who at some point becomes a terrorist, you are now also under full investigation. I don’t know about you, I find this scary and dystopian, but unfortunately it’s real. If someone you know does something that’s wrong, you are now also a suspected criminal. Metadata is sometimes even more valuable than the actual data itself. To quote the former NSA director Michael Hayden: “We Kill People Based on Metadata”. Especially since the Snowden leaks we know that we should protect ourselves from corporate/government overreach and surveillance and the best way to do this is avoiding proprietary software. FOSS is superior in any way: It’s built by voluntary individuals who just want to help out other people and try to make the world a better place, it’s transparent to the user and can be verified, you have the freedom to do with it whatever you want. We really shouldn’t be supporting multi-billion dollar corporations lead by weirdos. Did you know that Mark Zuckerberg bought all the land around his house, so that none of his neighbors can see what he is doing for privacy reasons, while he probably caused the biggest invasion of privacy in the last decade? We shouldn’t be supporting such people. We really shouldn’t.

  • bouh@lemmy.world
    link
    fedilink
    arrow-up
    15
    ·
    9 months ago

    It might be E2EE but it’s not encrypted on your phone and it’s closed source. How do you know they don’t send the conversation data to their company? How do you know they don’t get the encryption keys to decipher the messages for them?

    • SokathHisEyesOpen@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      ·
      9 months ago

      How do you know they don’t get the encryption keys to decipher the messages for them?

      My guess is that they just capture keywords before you send it. They don’t need to read the contents of the sent conversation when both parties to the conversation are using an app they own. They can detect keywords before sending, log and report them, then send the message encrypted. No need to retain encryption keys since they already extracted what they want.

    • Azzu@lemm.eeOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      edit-2
      9 months ago

      Other apps may have code published in a repository, but the path from repository into the Play Store onto my phone is not clear. How do I know that they don’t add extra tracking code on top during the build and release to the Play Store? With for example a popular alternate app, Signal?

      • Free Palestine 🇵🇸@sh.itjust.works
        link
        fedilink
        arrow-up
        2
        ·
        9 months ago

        You don’t have to use the Play Store. You can either compile Signal yourself or use a trustworthy 3rd party build of Signal. Personally, I use Molly. It’s Signal for Android but with some neat tweaks. It’s not even available on the Play Store, it’s exclusive to F-Droid and Accrescent. You can’t do any of this with proprietary garbage like WhatsApp. Neither can you modify it to add features, nor can you look at the source code or compile it yourself.

  • majestictechie@lemmy.fosshost.com
    link
    fedilink
    English
    arrow-up
    15
    ·
    9 months ago

    While the messages itself are encrypted, the WhatsApp App itself can still collect data from you from the Device your using it on:

    • Phone number
    • operating system
    • associated contacts Etc.

    And given this is a Meta owned company, we can probably assume they profile you from that.

  • ReversalHatchery@beehaw.org
    link
    fedilink
    arrow-up
    9
    ·
    edit-2
    9 months ago

    It says it’s end-to-end encrypted. The metadata isn’t. But what is metadata and is it bad that it’s not?

    It’s not just that. Their app can easily have tracking components that look for the list of installed apps, how often you charge your phone, how often are you on a WiFi network, etc.

    Also, the app and any tracking component it has can also freely communicate on the wifi network. That doesn’t only mean the internet, but the local, home network too, where they can find out (by MAC address, opened ports and response of the corresponding programs) what kind of devices you have, when do you have them powered on, what software you use on it (like do you use any bittorrent client? syncthing? kde connect? lots of other examples?), and if let’s say your smart tv publishes your private info on the network, it does not matter that you have blocked LG (just an example) domains in your local dns server, because facebook’s apps can just relay it through your phone and then their own servers.

    If the app’s code has been obfuscated, exodus privacy and others won’t be able to detect the tracking components in it.

    • Azzu@lemm.eeOP
      link
      fedilink
      arrow-up
      3
      ·
      9 months ago

      Are others different, like Signal and how do I know?

      As a normal user I install both in exactly the same way, I have no way to verify that the code of the apk on the play store is exactly the same as the code published by Signal as open-source. How could I trust Signal more?

      • Devjavu@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        3
        ·
        9 months ago

        You can only know if you choose to read the code and compile from source. You can trust, in that your read the code and just install the app, or let others read the code for you. If reputable sources tell you it’s good, most of the time it’s good. How can you trust Signal more? Well you… shouldn’t. You could try to use a decompilation tool, don’t know if that works on Android’s apps though.

      • American_Jesus@lemm.ee
        link
        fedilink
        arrow-up
        3
        ·
        9 months ago

        That means if they want to see your messages they do it anytime, not only when someone report it.

        If a government want access to the messages they can access.

        • American_Jesus@lemm.ee
          link
          fedilink
          arrow-up
          2
          ·
          9 months ago

          Unlike other messaging apps, they have access to encryption keys, when you change devices you only need to fill the phone number and all of your messages are available.

          On other apps like Signal or matrix, you need to backup or export your keys to other devices, otherwise you can access previous messages.

          It’s like you own an apartment and the doorman have keys to all apartments, if you lose the key the doorman can give you a copy, but also have access to your apartment when it pleases.

          • Lojcs@lemm.ee
            link
            fedilink
            arrow-up
            1
            ·
            9 months ago

            Don’t you need to have backed up your messages in Google drive to be able to restore them when changing devices? And up until the multi device update when someone changed their phone you’d get a text saying your encryption keys with them has changed.

            And I remember talks in matrix about the need for a single password solution to appeal to masses.

  • just_another_person@lemmy.world
    cake
    link
    fedilink
    arrow-up
    5
    arrow-down
    2
    ·
    9 months ago

    E2E is not equal to Symmetric Encryption, which is the most private “one way” encryption meaning the user controls the data at the origin, and the messages can’t be decrypted by anyone else.

    WhatsApp is not the latter, so it is not private. Signal is symmetric, for example.

    • Lojcs@lemm.ee
      link
      fedilink
      arrow-up
      3
      ·
      9 months ago

      Care to elaborate? You can’t just imply asymmetric encryption can be decrypted by 3rd parties and not explain how.

      Also I don’t know how exactly signal works but I know that you don’t need to share secrets externally to message someone, so how are they exchanging the symmetric keys without using asymmetric encryption to boot?

      • just_another_person@lemmy.world
        cake
        link
        fedilink
        arrow-up
        1
        ·
        9 months ago

        This is more of a “how encryption” works question, so I’ll just defer to some article response I got from Google which explains it simpler than I would:

        “When someone sends a message to a contact over an app using the Signal protocol, the app combines the temporary and permanent pairs of public and private keys for both users to create a shared secret key that’s used to encrypt and decrypt that message. Since generating this secret key requires access to the users’ private keys, it exists only on their two devices. And the Signal protocol’s system of temporary keys—which it constantly replenishes for each user—allows it to generate a new shared key after every message.”

        • Lojcs@lemm.ee
          link
          fedilink
          arrow-up
          3
          ·
          9 months ago

          That doesn’t explain why asymmetric encryption is insecure? In fact signal seems to be using two pairs of asymmetric keys to generate its symmetric secret, so it would also be prone to attack if asymmetric encryption was a flawed system.

  • BearOfaTime@lemm.ee
    link
    fedilink
    arrow-up
    2
    ·
    9 months ago

    If you’re on Android, the E2E is meaningless as WhatsApp can read what you type, just as the Facebook app can, since they have keyboard access.

    I don’t know that they do this, just saying it’s a leak point, and since it’s Meta/Facebook/Zuckerberg, well, let’s just say I’m a bit cynical.