Home New Trending Search
About Privacy Terms
#
#EndToEndEncryption
Posts tagged #EndToEndEncryption on Bluesky
Preview
Meta to Discontinue End-to-End Encrypted Chats on Instagram Come May 2026   Meta Platforms has confirmed that it will remove support for end-to-end encrypted messaging in Instagram direct messages beginning May 8, 2026. After this date, conversations that previously relied on this encryption feature will no longer be protected by the same privacy mechanism. According to guidance published in the platform’s support documentation, users whose conversations are affected will receive instructions explaining how to download messages or media files they want to retain. In some situations, individuals may also need to install the latest version of the Instagram application before they can export their chat history.   When asked about the decision, Meta stated that encrypted messaging on Instagram saw limited adoption. The company explained that only a small percentage of users chose to enable end-to-end encryption within Instagram direct messages. Meta also pointed out that people who want encrypted communication can still use the feature on WhatsApp, where end-to-end encryption is already widely used. How Instagram Encryption Was Introduced Instagram’s encrypted messaging capability was originally introduced as part of a broader push by Meta to transform its messaging ecosystem. In 2021, Meta CEO Mark Zuckerberg outlined a “privacy-focused” strategy for social networking that aimed to shift communication toward private and secure messaging environments.  Within that initiative, Meta began experimenting with encrypted direct messages on Instagram. However, the feature never became the default setting for users. Instead, it remained an optional capability available only in certain regions and had to be manually activated within specific conversations. The tool also gained relevance during geopolitical tensions. Shortly after the outbreak of the Russia-Ukraine conflict in early 2022, Meta expanded access to encrypted direct messages for adult users in both Russia and Ukraine. The company said the move was intended to provide safer communication channels during the early phase of the war. Industry Debate Over Encrypted Messaging The decision to discontinue Instagram’s encrypted chats comes amid a broader debate in the technology sector about whether strong encryption improves or complicates online safety. Recently, the social media platform TikTok said it currently has no plans to introduce end-to-end encryption for its messaging system. The company told the BBC that such technology could reduce its ability to monitor harmful activity and protect younger users from abuse. End-to-end encryption is widely regarded by cybersecurity experts as one of the strongest ways to secure digital communication. When this technology is used, messages are encrypted on the sender’s device and can only be decrypted by the recipient. This means that even the platform hosting the conversation cannot read the message contents during transmission.  Because of this design, encrypted systems can protect users from surveillance, data interception, or unauthorized access by third parties. Many messaging services, including WhatsApp and Signal, rely on similar encryption models to secure billions of conversations globally. Law Enforcement Concerns Despite its privacy advantages, encryption has long been controversial among law enforcement agencies and child-safety advocates. Critics argue that encrypted messaging makes it harder for technology companies to detect criminal behavior such as terrorism recruitment or the distribution of child sexual abuse material. Authorities describe this challenge as the “Going Dark” problem, referring to situations where investigators cannot access message content even when they obtain legal warrants. Policymakers have repeatedly warned that widespread encryption could reduce the ability of platforms to cooperate with criminal investigations. Internal documents previously reported by Reuters indicated that some Meta executives had raised similar concerns internally. In discussions dating back to 2019, company officials warned that widespread encryption could limit the company’s ability to identify and report illegal activity to law enforcement authorities.  Regulatory Pressure and Future Policy The global policy debate around encryption is still evolving and charting new courses. The European Commission is expected to release a technology roadmap on encryption later this year. The initiative aims to explore ways to allow lawful access to encrypted data for investigators while preserving cybersecurity protections and civil liberties. A Changing Messaging Strategy Meta’s decision to remove encrypted messaging from Instagram highlights the complex trade-offs technology companies face when balancing privacy protections with safety monitoring and regulatory expectations. While encryption remains a cornerstone of messaging on WhatsApp and has expanded across other platforms, the rollback on Instagram suggests that adoption rates, platform design, and policy pressures can influence whether such security features remain viable. For Instagram users who relied on encrypted chats, the upcoming change means reviewing conversations before May 2026 and exporting any information they wish to keep before the feature is officially retired.

Meta to Discontinue End-to-End Encrypted Chats on Instagram Come May 2026 #encryptedmessagingapps #EndToEndEncryption #Instagram

0 0 0 0

#Instagram will #discontinue #endtoendencryption for #directmessages after 8 May 2026, allowing Meta to access private messages. The change, which will likely raise #privacy concerns, may be linked to efforts to combat illegal material on the platform.…

0 0 0 0
Preview
Instagram Ending End-to-End Encryption: What Users Must Know Instagram will remove end-to-end encryption after May 8, 2026. Users should save messages and media as chats may no longer stay fully private.

Instagram is ending end-to-end encryption on May 8, 2026. Users should download important messages and media as chats may no longer be fully private.

#mymobprice #InstagramUpdate #EndToEndEncryption #MetaNews #PrivacyMatters #TechNews

mymobprice.com/blog/article...

0 0 0 0
Post image

Watch what you say in your #InstagramDMs! Starting May 8th, Meta is ditching #EndToEndEncryption so they can scan your private chats. If you care about your #Privacy, it's time to be careful or find a new app for #Messaging. Download your data now! 👇🏾

3 5 1 0
Post image

Watch what you say in your #InstagramDMs! Starting May 8th, Meta is ditching #EndToEndEncryption so they can scan your private chats. If you care about your #Privacy, it's time to be careful or find a new app for #Messaging. Download your data now! 👇🏾

0 2 1 0
Post image

WhatsApp Launches Parent-Managed Accounts
Read More: buff.ly/VrfyhlV

#WhatsAppSafety #ParentControls #ChildOnlineSafety #EndToEndEncryption #AccountSecurity #DigitalWellbeing #MessagingSecurity #PrivacyTech

0 0 0 0
Preview
TikTok incapable of delivering both user privacy *and* user safety, retains capability to surveil user communications Nothing to do with it being Chinese, then? “TikTok told the BBC it believed end-to-end encryption prevented police and safety teams from being able to read direct messages if they needed to. …

TikTok incapable of delivering both user privacy *and* user safety, retains capability to surveil user communications
https://alecmuffett.com/article/148043
#EndToEndEncryption #censorship #china #surveillance #tiktok

3 7 0 0
Post image

Stay safe online! Discover the best end-to-end encrypted messenger apps to protect your privacy and security. Read now: rebrand.ly/End2End-Encr... #EndToEndEncryption #SecureMessaging #Senwill

0 0 0 0

Tired of WhatsApp spying on your chats? Switch to real privacy apps!

Signal
SimpleX Chat
Element
Session
Telegram

#PrivacyMatters #SecureMessaging #SignalApp #SimpleXChat #Threema #ElementChat #SessionApp #Telegram #EndToEndEncryption #WhatsAppAlternative #DigitalPrivacy #PrivacyFirst"

0 0 0 0
Preview
“Google and Apple today announced that testing of encrypted RCS messaging between Android and iPhone is now underway” | Yay, more end-to-end encryption! My understanding is that the RCS E2EE test is available globally, except for China & France. Yes, really. Google and Apple today announced that testing of encrypted RCS messaging between Androi…

“Google and Apple today announced that testing of encrypted RCS messaging between Android and iPhone is now underway” | Yay, more end-to-end encryption!
https://alecmuffett.com/article/146816
#EndToEndEncryption #HellFrozeOver #android #iphone

11 0 1 1

One of the many, many reasons I do NOT use any of Fuckerberg’s products. I quit FB back in 2017 after the Cambridge Analytica mess. I DO NOT trust that app period! I have a suggestion for EVERYONE! If you want private chat groups, use @signal.org or Wire.
#EndToEndEncryption

3 2 0 0
Post image

Stay safe online! Discover the best end-to-end encrypted messenger apps to protect your privacy and security. Read now: rebrand.ly/End2End-Encr... #EndToEndEncryption #SecureMessaging #Senwill

0 0 0 0
Post image

Stay safe online! Discover the best end-to-end encrypted messenger apps to protect your privacy and security. Read now: rebrand.ly/End2End-Encr... #EndToEndEncryption #SecureMessaging #Senwill

0 0 0 0

Password managers' promise that they can't see your vaults isn't always true https://arstechni.ca #endtoendencryption #passwordmanagers #zeroknowledge #Features #Security #Biz&IT

1 0 0 0
Post image

Bitwarden Launches Cupid Vault Feature
Read More: buff.ly/WyUPbOd

#Bitwarden #PasswordManager #EndToEndEncryption #CredentialSharing #PrivacyTech #AccountSecurity #CyberHygiene #ZeroKnowledge

0 0 0 0
Post image

WhatsApp Web now supports voice and video calls! Experience seamless, end-to-end encrypted communication directly from your browser. #WhatsAppWeb #VoiceCall #VideoCall #EndToEndEncryption Link: thedailytechfeed.com/whatsapp-web...

0 0 0 0
Preview
US Probes Claims Meta Can Read Encrypted WhatsApp Messages US authorities have investigated claims that Meta can access encrypted WhatsApp messages, though security experts question the lawsuit's technical allegations.

winbuzzer.com/2026/02/02/u...

US Probes Claims Meta Can Read Encrypted WhatsApp Messages

#WhatsApp #Meta #Privacy #DataPrivacy #Cybersecurity #Encryption #EndToEndEncryption #Lawsuits #BigTech

1 0 0 0
Post image

Stay safe online! Discover the best end-to-end encrypted messenger apps to protect your privacy and security. Read now: rebrand.ly/End2End-Encr... #EndToEndEncryption #SecureMessaging #Senwill

0 0 0 0
Post image Post image

🔒 Your business communications are locked down tight! With our #EndToEndEncryption, #emails, #eSign, #FileShare, & #Messages are safe. No sneaky peeks here! ✊ Dive in: rebrand.ly/Senwill-RPos #BusinessSecurity #CyberSecurity #DataProtection #E2EE #NIST #Quantum #Senwill

0 0 0 0
Post image

Stay safe online! Discover the best end-to-end encrypted messenger apps to protect your privacy and security. Read now: rebrand.ly/End2End-Encr... #EndToEndEncryption #SecureMessaging #Senwill

0 0 0 0
Preview
next, after age verification, will come “proof of humanity” … …which will likewise fail; not to mention that there is nothing in the supposed demand which cannot already be implemented using TLS “the human-killing AI robots demand end-to-end encrypted p…

next, after age verification, will come “proof of humanity” …
https://alecmuffett.com/article/143876
#EndToEndEncryption #ai #privacy

6 3 0 0
Preview
Introducing Encrypt It Already | Electronic Frontier Foundation [EFF is] launching Encrypt It Already, our push to get companies to offer stronger privacy protections to our data and communications by implementing end-to-end encryption. If that name sounds a li…

Introducing Encrypt It Already | Electronic Frontier Foundation
https://alecmuffett.com/article/143853
#EndToEndEncryption #eff

4 3 0 0
Preview
WhatsApp’s new ‘Strict Account Settings’ Adds Lockdown-Style Protection Against Spyware |CyberScoop While safety activists are still whining about 2 billion people in the world getting communications privacy: The “Strict Account Settings” feature will roll out in the coming weeks and once enabled…

WhatsApp’s new ‘Strict Account Settings’ Adds Lockdown-Style Protection Against Spyware |CyberScoop
https://alecmuffett.com/article/143457
#EndToEndEncryption #OnlineSafety #OnlineSafetyAct #encryption #whatsapp

2 1 0 0
Preview
Microsoft Gave The FBI BitLocker Encryption Keys, Breaking from Apple Privacy Stance - WinBuzzer Microsoft has provided BitLocker encryption keys to the FBI in a Guam fraud case, marking the first known instance of such cooperation and raising privacy concerns.

winbuzzer.com/2026/01/23/m...

Microsoft Gave FBI BitLocker Keys, Breaking from Apple Privacy Stance

#BitLocker #Microsoft #Security #Encryption #Privacy #Cybersecurity #DataPrivacy #EndToEndEncryption #Law #Windows #UserPrivacy #NationalSecurity #PrivacyProtection

1 0 0 0
Preview
WhatsApp Bug Leads to Exposure of User Metadata   The Meta organization has begun to address a number of vulnerabilities in WhatsApp that expose sensitive user information. These vulnerabilities indicate that, even when platforms are encrypted, they can inadvertently reveal critical device details.  The vulnerabilities are caused by the messaging service's multi-device architecture, which allows subtle implementation differences to reveal whether the user is using an Android or an iOS device, while still maintaining end-to-end encryption for message content.  According to security researchers, this type of capability, which helps identify or identify operating systems by their fingerprints, is of particular value to advanced threat actors. These actors often choose WhatsApp-with its more than three billion active users per month-as their preferred channel for delivering advanced spyware to their customers. It was discovered that attackers are able to exploit zero-day flaws that allow them to passively query WhatsApp servers for cryptographical session details without being able to interact with the victim, using variations in key identifiers, such as Signed Pre-Keys and One-Time Pre-Keys, in order to determine the target platform.  By utilizing this intelligence, adversaries can tailor exploits to the specific needs of their victims, deploying Android-specific malware only to compatible devices, while avoiding detection by others, emphasizing the difficulties in masking metadata signatures even within encrypted communication ecosystems despite this intelligence. It has been warned that threat actors who abuse WhatsApp as an attack vector may be able to passively query WhatsApp's servers for encryption-related content, which would allow them to obtain information regarding devices without the need for user interaction. With this capability, adversaries can accurately determine the operating system of a victim, with recent findings suggesting that subtle differences in key ID generation can be used to reliably differentiate between Android and iOS devices.  APT operations that are targeted at advanced persistent threats (APTs) often involve the deployment of zero-day exploits tailored to specific platforms. However, deploying these exploits to inappropriate devices can not only result in the failure of the attack, but may expose highly sensitive attack infrastructure worth millions of dollars.   Furthermore, the study concluded that there may also be a risk of data theft, as it estimated that data linked to at least 3.5 billion registered phone numbers could possibly be accessed, a number that may include inactive or recycled accounts as well.  Besides cryptographic identifiers, the accessible information included phone numbers, timestamps, “About” field text, profile photos, and public encryption keys, which prompted researchers to warn against the possibility that, in the wrong hands, this dataset could have led to one of the largest data leaks ever documented in human history.  Among the most concerning findings of the study was the fact that more than half of the accounts displayed photos, with a majority displaying identifiable faces. There is a strong possibility that this will lead to large-scale abuse, such as reverse phonebook services using facial recognition technology. It was pointed out by Gabriel Gegenhuber, the study's lead author, that the systems should not be allowed to handle such a large number of rapid queries from a single source as they might otherwise. He pointed out that Meta tightened the rate limiting on WhatsApp's web client in October 2025 after the problem had been reported through the company's bug bounty program earlier that year, which led to a change in rate limits on WhatsApp's web client.  It has been determined by further technical analysis that attackers can obtain detailed insights about a user's WhatsApp environment by exploiting predictable patterns in the application's encryption key identifiers that give detailed insight into a user's environment.  Research recently demonstrated the possibility of tracing the primary device of a user, identifying the operating system of each linked device, estimating the relative age of each connected device, and determining whether WhatsApp is accessed through a mobile application or a desktop web client, based on if WhatsApp is accessed through either app.  A number of conclusions were drawn from the history of deterministic values assigned to certain encryption key IDs that have effectively served as device fingerprints for decades. It is Tal Be'ery, co-founder and chief technology officer of Zengo cryptocurrency wallet, who was one of the researchers leading this research, who, along with other experts, shared their findings with Meta.  As early reports indicated little response from the company, Be'ery observed later that the company began to mitigate the issue by introducing a randomization system for key ID values, specifically on Android devices, which seemed to have worked. He was able to confirm that these changes represent progress when he used a non-public fingerprinting tool to test the system, even though the technique was only partially effective.  An article by Be'ery published recently and a demonstration that followed showed that attackers are still able to distinguish Android and iPhone devices based on One-Time Pre-Key identifiers with a high degree of confidence.  It is cited in the article that the iPhone's initial values are low with gradual increments as opposed to Android's broader, randomized range, which is much larger. However, he acknowledged that Meta had recognized the issue as a legitimate security and privacy concern and welcomed the steps taken to reduce its impact despite these limitations. It is important to emphasize, therefore, that the study highlights WhatsApp metadata exposed to the outside world is not a theoretical worry, but a real security risk with wide-ranging consequences. When advanced attacks take place, metadata plays a key role in reconnaissance, providing adversaries with the ability to identify targets, differentiate between iOS and Android environments, select compatible exploits, and reduce the number of unsuccessful intrusion attempts, thereby allowing them to succeed with social engineering, spear-phishing, and exploit chain attacks as a whole. In a large-scale scenario, such data can be fed into OSINT applications and AI-driven profiling tools, which allows for significant cost reduction on the selection of targets while also enhancing the precision of malicious operations when applied at scale. Moreover, researchers warned of the dangers associated with public profiles photos, stating that by being able to tie facial images to phone numbers on a mass scale, specialists might be able to create facial recognition-based reverse phonebook services based on the ability to link facial recognition to phone numbers. A significant portion of these risks may be magnified for those with a high exposure rate or who are in regulated environments, such as journalists, activists, and professionals who perform sensitive tasks, where metadata correlation may result in physical or personal harm.  It was learned from the study that millions of accounts are registered in jurisdictions where WhatsApp has been banned officially, raising concerns that using WhatsApp in these regions may have legal and/or persecutorial repercussions. It is important to note that this study highlights the structural problems that WhatsApp's centralized architecture creates, resulting in a single point of failure that affects billions of users, limits independent oversight, and leaves individuals with little control over their data.  As a result, the research highlights a number of structural issues inherent in WhatsApp’s centralized architecture. A number of researchers recommend that users should take practical steps in order to reduce exposure until deeper structural safeguards are implemented or alternative platforms are adopted.  Some of those steps include restricting profile photo visibility, minimizing personal details in public fields, avoiding identifiable images when appropriate, reviewing connected devices, limiting data synchronization, and utilizing more privacy-preserving messaging services for sensitive communication, just to name a few. In sum, the findings of the research suggest that there is a widening gap between the protections users expect from encrypted messaging platforms and the less visible risks related to metadata leaks. It is evident from Meta’s recent mitigation efforts that the issue has been acknowledged, but that the persistance of device fingerprinting techniques illustrates that large and globally scaled systems can be difficult to completely eradicate side-channel signals.  The fact remains that even limited metadata leakage on a platform that functions as a primary communication channel for governments, businesses, and civil society organizations alike may have outsized consequences if it is aggregated or exploited by capable adversaries.  It is also important to recognize that encryption alone is not sufficient to guarantee privacy when the surrounding technical and architectural decisions allow the inference of contextual information.  WhatsApp’s experience serves as a reminder that, as regulators, researchers, and users increasingly scrutinize the security boundaries of dominant messaging services, it is imperative that strong cryptography be used to protect billions of users as well as continuous transparency and rigorous oversight. Metadata needs to be treated as a first-class security concern, rather than something that can't be avoided.

WhatsApp Bug Leads to Exposure of User Metadata #CyberReconnaissance #EndToEndEncryption #MetadataExposure

0 0 0 0
Preview
Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw | Forbes This is the future of which GCHQ wants for all global encryption: “Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key re…

Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw | Forbes
https://alecmuffett.com/article/142847
#EndToEndEncryption #HomeOffice #KeyEscrow #apple #encryption #gchq #privacy #surveillance

5 3 1 1
Post image

Stay safe online! Discover the best end-to-end encrypted messenger apps to protect your privacy and security. Read now: rebrand.ly/End2End-Encr... #EndToEndEncryption #SecureMessaging #Senwill

0 0 0 0
Post image

Stay safe online! Discover the best end-to-end encrypted messenger apps to protect your privacy and security. Read now: rebrand.ly/End2End-Encr... #EndToEndEncryption #SecureMessaging #Senwill

0 0 0 0
Preview
UK Orders Ofcom to Enforce Encryption Backdoors [Baroness Berger] also accused tech companies of lying when they say scanning encrypted messages isn’t possible. And maybe they are. But when your answer to that is “Well, we’ll just force them to …

UK Orders Ofcom to Enforce Encryption Backdoors
https://alecmuffett.com/article/140694
#ClientSideScanning #EndToEndEncryption #OnlineSafety #OnlineSafetyAct #censorship #surveillance

6 7 1 0