logoalt Hacker News

martinralbrechtyesterday at 5:04 PM7 repliesview on HN

WhatsApp's end-to-end encryption has been independently investigated: https://kclpure.kcl.ac.uk/ws/files/324396471/whatsapp.pdf

Full version here: https://eprint.iacr.org/2025/794.pdf

We didn't review the entire source code, only the cryptographic core. That said, the main issue we found was that the WhatsApp servers ultimately decide who is and isn't in a particular chat. Dan Goodin wrote about it here: https://arstechnica.com/security/2025/05/whatsapp-provides-n...


Replies

vpShaneyesterday at 8:03 PM

> We didn't review the entire source code And, you don't see the issue with that? Facebook was bypassing security measures for mobile by sending data to itself on localhost using websockets and webrtc.

https://cybersecuritynews.com/track-android-users-covertly/

An audit of 'they can't read it cryptographically' but the app can read it, and the app sends data in all directions. Push notifications can be used to read messages.

show 1 reply
cookiengineeryesterday at 8:55 PM

Why did you not mention that the WhatsApp apk, even on non-google play installed devices, loads google tag manager's scripts?

It is reproducibly loaded in each chat, and an MitM firewall can also confirm that. I don't know why the focus of audits like these are always on a specific part of the app or only about the cryptography parts, and not the overall behavior of what is leaked and transferred over the wire, and not about potential side channel or bypass attacks.

Transport encryption is useless if the client copies the plaintext of the messages afterwards to another server, or say an online service for translation, you know.

show 1 reply
morshu9001yesterday at 9:00 PM

They also decide what public key is associated with a phone number, right? Unless you verify in person.

show 1 reply
some_furryyesterday at 5:12 PM

Thank you for actually evaluating the technology as implemented instead of speculating wildly about what Facebook can do based on vibes.

show 1 reply
Jamesbeamyesterday at 11:33 PM

Hello Professor Albrecht,

thank you for your work.

I’ve been looking for this everywhere the past few days but I couldn’t find any official information relating the use of https://signal.org/docs/specifications/pqxdh/ in the signal protocol version that WhatsApp is currently using.

Do you have any information if the protocol version they currently use provides post-quantum forward secrecy and SPQR or are the current e2ee chats vulnerable to harvest now, decrypt later attacks?

Thanks for your time.

uoaeiyesterday at 9:52 PM

Can they control private keys and do replay attacks?

show 1 reply
digdigdagyesterday at 8:30 PM

> We didn't review the entire source code

Then it's not fully investigated. That should put any assessments to rest.

show 3 replies