upvote
zuck can read your whatsapp messages, at this point I think I'd rather criminals and the government read them instead
reply
WhatsApp is end-to-end encrypted. No one at Meta can read your messages.
reply
Saw this exact claim on a billboard not too long ago

It's a strangely worded statement. What about data collection, metadata, other third parties

Maybe it's related to the fact that plaintiffs lawyers are now trying to verify what's going on inside Meta with WhatsApp through litigation discovery:

https://ia801607.us.archive.org/10/items/gov.uscourts.cand.4...

Meta's motion to dismiss seemed a little weak. Time will tell

https://ia801607.us.archive.org/10/items/gov.uscourts.cand.4...

Hearing will likely be sometime this summer

reply
If I can log into whatsapp on a new device and old messages aren’t encrypted then they have a copy of your key and it is not true e2e encryption.
reply
You can't unless you've chosen to back up your WhatsApp messages to iCloud/Google in which case it's Apple/Google responsible for preserving the messages and subject to their encryption standards, nothing to do with Meta.
reply
Try logging in on a new device and putting your main device into aeroplane mode as soon as the login succeeds. Loading of old messages on the new device will stop.
reply
How are we sure that it is really end-to-end encrypted?
reply
Moxie Marlinspike (founder of Signal) [0]implemented the same E2EE algorithm as Signal (Signal Protocol) into WhatsApp, but that was 10 years ago, so who knows if things have changed since then.

[0] https://en.wikipedia.org/wiki/Moxie_Marlinspike

reply
Practically speaking, it isn't secure; no closed app can be. It receives regular compulsory updates (old versions refuse to work) and there's nothing at all stopping Zuck from sneaking in backdoors targeted at you personally.
reply
yeah who wants marginally regulated oligarchs -- Give me fully unregulated criminals!
reply
Nobody gives a damn. What matters is that it works even on a potato.

SMS security only became a problem due to 2FA, which is just one of many use cases, and the failure isn't even technical here but organizational. I agree it should've prompted more pressure to secure the system against SIM-swapping; alas this is too close to the Real World, so the tech industry instead responded with alternative that side-steps the problem by offering zero customer support. No humans to talk to = no humans to social engineer = secure. So much win.

(I'd also say the 2FA proliferation is itself a problem, but that's an unpopular opinion and for a separate discussion.)

reply
> Nobody gives a damn. What matters is that it works even on a potato.

It doesn't work on my computer, nor does it work on my phone when I'm traveling (different SIM), so I give a damn. WhatsApp, iMessage, Signal etc. do both. I really wish there was an open, federated standard (and no, RCS is neither), but until then, I'll use what actually works for me.

SMS just sucks, and I hate that it's become so ubiquitous an authentication method when it's not even secure.

reply
You can rent a virtual mobile number in your home country and consult SMSs on the web or even redirect them to email. I have done this for years, using Twilio for 2€ a month. Can't say the UX is great but it certainly fixes the whole problem.

I've never understood why so many people still chain their identities to physical SIM or even eSIMs. It's so fragile.

reply
> I've never understood why so many people still chain their identities to physical SIM or even eSIMs. It's so fragile.

Living in a place where getting a replacement sim is gated behind obtaining an id from the police tied to your national id number, I wish there were other identity systems which were as robust. Much easier to get back to normal operations when the id device becomes damaged or lost with a physical sim you can shove into a cheap replacement device, than relying on backup services you need one of your digital id devices to access in the first place, especially if they're all lost at the same time in a house fire or something. The police will presumably get all my photo backups and savings if they ask nicely anyways, so the big threat to the single point of failure doesn't have a great marginal impact, while I dread the possibility of having to recover the accounts I can't get back through the local legal system given the poor 2fa recovery ecosystem.

reply
>Much easier to get back to normal operations when the id device becomes damaged or lost with a physical sim you can shove into a cheap replacement device

If the device can get damaged or lost, then the SIM can too. To buy a physical SIM or rent a virtual number online, in most jurisdictions you need to provide ID docs these days, so nothing is changed there.

reply
Yeah, that's a good workaround. Google Voice can work too.

Unfortunately, more and more services are declining to send to VoIP numbers because of seCurItY, so it's a game of cat and mouse.

Fortunately SMS is so expensive in parts of Europe and it's not allowable anymore to use SMS by itself for online payment authentication, and both issues combined have slowly been pushing companies to explore alternatives.

There unfortunately seems to be no such pressure in the US. Passkeys could solve the issue, but probably increase support request volumes enough for most companies to not bother unless forced.

reply
If you port a landline number to a VoIP service, services can't really tell that you're using VoIP, as far as I can tell.
reply
It's easy and cheap to determine the original carrier (or its sucessor) for a US phone number. It costs money to do a porting lookup to determine the current carrier.

Most of the reason to deny voip users is that many voip services give phone numbers away like candy and then those phone numbers are used to abuse other services, so checking the original carrier tends to be enough for abuse screening.

Some use cases want more though. Banking KYC has some back channel to get subscriber identification or be alerted when ownership changes; those institutions may be willing to pay for current carrier lookups and deny usage of numbers where they don't have a back channel to the current carrier.

reply
This is great info, thanks!
reply
In the US, I belive there are three number categories in the NANP porting database (wireline, cellular, and VoIP), and SMS senders can definitely tell, even though it might take a while (presumably there's a lot of caching going on).

If you're lucky, the service you care about only validates at number registration time, not at text sending time, and you can get away with it indefinitely, I suppose.

reply
I thought that too but many carriers around me don't allow porting any VoIP-using number back to cellular. (Not sure if you were making a distinction between landline and cellular)

Unfortunately that means that my cell number which I wanted to temporarily park into VoIP while abroad is now permanently VoIP.

reply