• 0 Posts
  • 433 Comments
Joined 2 years ago
cake
Cake day: December 29th, 2023

help-circle







  • it is not. meta controls the keys. that’s how they’re accessing the messages

    the article says they can access any message, from any user, from any time period, even deleted, instantly

    to make this a client-side exploit would mean that messages would need to be constantly sent in the clear (not targeted per user) for years now… and someone would have noticed that

    we know meta holds the encryption keys: that’s a known fact… it’s much much easier for them to simply decrypt everything they store



  • this isn’t a client-side exploit. this is the fact that meta controls the encryption keys. the mention “widget”, but that’s not a widget on your device; they say it’s a widget on their workstation - whatever that means. i’m thinking it’s something akin to raising a ticket which triggers a workflow to remote install an app on a work device (a process common at large enterprises)

    worker need only send a ‘task’ (i.e., request via Meta’s internal system) to a Meta engineer … the worker’s workstation will then have a new window or widget available that can pull up any WhatsApp user’s messages based on the user’s User ID number … Once the Meta worker has this access, they can read users’ messages by opening the widget; no separate decryption step is required