Sahwa@reddthat.com to Technology@lemmy.worldEnglish · 11 days agoA federal agent said WhatsApp's encryption is a lie. Then the investigation was shut downwww.techspot.comexternal-linkmessage-square95fedilinkarrow-up1709arrow-down16file-text
arrow-up1703arrow-down1external-linkA federal agent said WhatsApp's encryption is a lie. Then the investigation was shut downwww.techspot.comSahwa@reddthat.com to Technology@lemmy.worldEnglish · 11 days agomessage-square95fedilinkfile-text
A 10-month Commerce Department probe concluded Meta could view all WhatsApp messages in unencrypted form
minus-squareRailcar8095@lemmy.worldlinkfedilinkEnglisharrow-up7arrow-down1·10 days agoWhere’s the private key? I can get a new phone, log with WhatsApp and download all the historical messages without intruducing any additional password or key. I assume they have all the required data too.
minus-squarezergtoshi@lemmy.worldlinkfedilinkEnglisharrow-up1·10 days agoSounds like a compromised phone in the sense that it doesn’t protect (and instead transmit) the private key.
minus-squareRailcar8095@lemmy.worldlinkfedilinkEnglisharrow-up4·10 days agoThat’s not the phones fault, but how WhatsApp works
minus-squarezergtoshi@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down3·10 days agoHow is a phone not compromised if it hosts apps that play into the hands of evil actors?
minus-squareWhyJiffie@sh.itjust.workslinkfedilinkEnglisharrow-up1·10 days agoit is not, unless the app can exfiltrate data from other apps
minus-squareRailcar8095@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down1·10 days agoI undersrstand my threat model and how to limit exposure.
Where’s the private key? I can get a new phone, log with WhatsApp and download all the historical messages without intruducing any additional password or key.
I assume they have all the required data too.
Sounds like a compromised phone in the sense that it doesn’t protect (and instead transmit) the private key.
That’s not the phones fault, but how WhatsApp works
How is a phone not compromised if it hosts apps that play into the hands of evil actors?
it is not, unless the app can exfiltrate data from other apps
I undersrstand my threat model and how to limit exposure.