• Dumhuvud@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      When you report a user in an individual chat, WhatsApp receives up to five of the last messages they’ve sent to you.

      This particular function is not at odds with E2EE. The client can either:

      • Send decrypted messages to the server. This is flawed because a malicious client can fake them, setting someone up for a ban;
      • Send the keys so that the server can decrypt the messages. Depending on how often keys are rotated, this might leak a couple more messages than intended.
      • gila@lemmy.zip
        link
        fedilink
        arrow-up
        1
        ·
        12 hours ago

        You’re right, the messages would not be decrypted by the server but by the client making the report. Key rotation also shouldn’t be an issue because it uses a ratcheting chain key. But if the non-malicious client is already set up to send decrypted messages to the server, this seems antithetical to the idea that WhatsApp can’t read your conversations. There are clear caveats without even introducing the idea of a malicious client potentially exfiltrating decrypted messages elsewhere. Signal on the other hand receives the reported senders phone number and an encrypted message ID, presumably acting on spam reports by relying on multiple reports of the same message from the same sender, rather than by reading the message