A 10-month Commerce Department probe concluded Meta could view all WhatsApp messages in unencrypted form

  • fodor@lemmy.zip
    link
    fedilink
    English
    arrow-up
    5
    ·
    14 days ago

    The clients are one question, but the servers are another. If the backdoor is on the server end, which it sure looks like, then your experts won’t find anything by examining the client.

    • yetAnotherUser@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 days ago

      I see. I thought that the backdoor had to be in the client, because I thought that could be the only place where the private keys are stored, but I’ve since realized that it could be on the server. Thanks for the insight.

    • nibbler@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      14 days ago

      If the client was open source, it could be verified by inspecting this source alone. To my understanding, the clients do real end to end encryption. This is the good part. They also have some functionality to re-encrypt the data or export the secret key to let new peers take part, or so i guess. This is how your web browser can also read them after you peer it up. Now there might or might not be a function in the client, where meta can request the private key or re-encryption. This is really hard to figure out without having the source code.