To the surprise of no one…

  • sun_is_ra@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    50 minutes ago

    Is that new? I remember reading about this years ago.

    yes communication is encrypted end to end which means no one could evedrop but once the information arrive to your app and get saved to your device there is nothing preventing whatsapp from sending to its parent company,

    E2E encryption doesnt mean whatsapp is trustworthy

  • tjoa@feddit.org
    link
    fedilink
    arrow-up
    6
    ·
    3 hours ago

    I don’t know if they still do it but they actively gaslight you into believing you have e2e even with peers you have not scanned the public key of.

    • unknowing8343@discuss.tchncs.de
      link
      fedilink
      arrow-up
      3
      ·
      52 minutes ago

      I get your point but E2E is independent from public key validation. Public key validation is basically being a bit more slightly sure that the E2E communication happens with who you think, although… It’s never a guarantee. Keys can be stolen.

  • reabsorbthelight@lemmy.world
    link
    fedilink
    arrow-up
    31
    ·
    4 hours ago

    “Your honor, end to end encryption is a marketing term that we have trademarked and we would like to counter sue anyone using it”

  • Autonomous User@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    1
    ·
    4 hours ago

    Correct, WhatsApp fails to include a libre software license text file. We do not control it. So, it has never been secure.

    • ChaoticNeutralCzech@feddit.org
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      2 hours ago

      Being FOSS is not a prerequisite of E2EE but a prerequisite of knowing it’s E2EE for sure. Like, I can give you a black box that prints PGP key pairs and says “includes RPGP, MIT-licensed PGP library” but you can’t trust that the machine doesn’t use modified, low-entropy RNG or exfiltrate the results. The communication you do with these PGP keys is technically E2EE − a third party server relaying your messages will not be able to read them, unless I provide them with the potentially not-so-secret “random” data my box generated.

      But you’re right: if my black boxes are also used to encrypt/decrypt the messages with “your” keys (made by them) and I run a non-transparent ssrvice that delivers the messages, there is a case for not calling it E2EE.