Sahwa@reddthat.com to Technology@lemmy.worldEnglish · 3 days agoA federal agent said WhatsApp's encryption is a lie. Then the investigation was shut downwww.techspot.comexternal-linkmessage-square100linkfedilinkarrow-up1776arrow-down16file-textcross-posted to: privacy@programming.dev
arrow-up1770arrow-down1external-linkA federal agent said WhatsApp's encryption is a lie. Then the investigation was shut downwww.techspot.comSahwa@reddthat.com to Technology@lemmy.worldEnglish · 3 days agomessage-square100linkfedilinkfile-textcross-posted to: privacy@programming.dev
A 10-month Commerce Department probe concluded Meta could view all WhatsApp messages in unencrypted form
minus-squareRailcar8095@lemmy.worldlinkfedilinkEnglisharrow-up8arrow-down1·2 days agoWhere’s the private key? I can get a new phone, log with WhatsApp and download all the historical messages without intruducing any additional password or key. I assume they have all the required data too.
minus-squarezergtoshi@lemmy.worldlinkfedilinkEnglisharrow-up1·2 days agoSounds like a compromised phone in the sense that it doesn’t protect (and instead transmit) the private key.
minus-squareRailcar8095@lemmy.worldlinkfedilinkEnglisharrow-up5·2 days agoThat’s not the phones fault, but how WhatsApp works
minus-squarezergtoshi@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down3·2 days agoHow is a phone not compromised if it hosts apps that play into the hands of evil actors?
minus-squareWhyJiffie@sh.itjust.workslinkfedilinkEnglisharrow-up1·2 days agoit is not, unless the app can exfiltrate data from other apps
minus-squareRailcar8095@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down1·2 days agoI undersrstand my threat model and how to limit exposure.
Where’s the private key? I can get a new phone, log with WhatsApp and download all the historical messages without intruducing any additional password or key.
I assume they have all the required data too.
Sounds like a compromised phone in the sense that it doesn’t protect (and instead transmit) the private key.
That’s not the phones fault, but how WhatsApp works
How is a phone not compromised if it hosts apps that play into the hands of evil actors?
it is not, unless the app can exfiltrate data from other apps
I undersrstand my threat model and how to limit exposure.