WhatsApp is about to launch its biggest upgrade in years—but there’s a surprise catch; the messaging giant has just warned users about a serious new problem, and you need to be very careful…

3/11 update below; article originally published 3/8.

The devil is always in the details—and no more so than with the new WhatsApp upgrade that has generated countless headlines in recent weeks. Meta’s messaging giant has confirmed its plans to comply with Europe’s DMA and open its platform to third-party chats.

Meta has just released technical details as to how this will actually work. Unfortunately, it doesn’t—at least not the way it is presented. The new guidance delivers a stark warning about the fatal flaw in the update—a nasty surprise for users expecting an exciting new world of unified, secure messaging.

As everyone likely knows by now, under Europe’s DMA, WhatsApp and other so-called gateway technologies need to open up to rival services—the same regulations that have dragged Apple into the scary new world of third-party app stores. WhatsApp stole a march on others by sharing early details on how it would comply, while suggesting this would work globally, not just in Europe.

Now the platform has gone a step further, sharing more of the technical detail underpinning its approach. There’s no real new technical news here—we knew most of it. But it does shine a light on some of the ways in which different apps will interface and ensure integrity between them. That said, it’s quiet on operational details, such as how users will actually find one another in the real world.

But the guidance does confirm a serious risk for the platform’s 2 billion users.

“We’re sharing how we enabled third-party interoperability (interop) while maintaining end-to-end encryption (E2EE) and other privacy guarantees in our services,” the new advisory explains, “as far as possible.” Those last four words matter more than all the rest.

Let’s start with some basics. End-to-end encryption means that when you message another person or a group, the content of the message is locked and only you and the people you’re messaging have the key. You can even ask the platform to confirm and assure the integrity of the devices that are part of the chat and the safety of shared keys. This means that Signal or Meta (in the case of WhatsApp) or Google (for Messages) or Apple (for iMessage) cannot unlock user content—it’s just not possible.

This differs from part-encrypted messaging—like Telegram (or Google Messages or Facebook Messenger, before their recent switch to end-to-end), where content is encrypted between your device/app and the server, and then again from the server to the receiving device/app. With part-encryption, the host platform has the key and can unlock content.

Europe’s DMA mandates that interoperability should not weaken security and privacy: “The level of security—including end-to-end encryption where applicable—that the gatekeeper provides to its own end-users shall be preserved across the interoperable services.”

This was always going to be a near impossibility. End-to-end encryption with endpoint assurance clearly only works where the two “ends” can actually be assured, which means—realistically—they are the same. Two WhatsApp or iMessage or Signal apps. DMA envisages a world where Signal messages might be sent to WhatApp users. And that so-called interoperability, by its very nature, breaks that model.

As EFF warned back in 2022, “requiring interoperability without unacceptable tradeoffs in security or privacy is a very high hurdle, one that might turn out to be insurmountable.”

Meta is strongly suggesting—if not quite mandating—that any third-party platforms wanting to access WhatApp should use the same Signal protocol it uses across its own services. “We use the Signal Protocol as the foundation for E2EE communications, as it represents the current gold standard for E2EE chats. In order to maximize user security, we would prefer third-party providers to use the Signal Protocol.” Meta will make exceptions to allow alternative encryption protocols, but only “if they are able to demonstrate it offers the same security guarantees as Signal.”

That part of Meta’s update prompted headlines around the use of Signal to apparently maintain existing end-to-end encryption—unfortunately that’s misleading. Yes, using Signal’s encryption protocol will assure content security while in transmission, it does nothing to assure what happens at those ends.

As ESET’s Jake Moore explains, “it’s just not possible to send a message from one encrypted app to another without a serious downgrade of the cryptographic techniques in order to accommodate this interoperable feature. While end-to-end encryption is seamless for most users, no two apps implement encryption identically and this is where the security problems lie. A compromise is inevitable, but the real problem is that technology companies know that a large majority of users still do not fully understand or worry about the privacy and security risks.”

Which leads us to WhatsApp’s new warning—which is extremely serious. “The E2EE promise Meta provides to users requires us to control both the sending and receiving clients… While we have built a secure solution for interop that uses the Signal Protocol encryption to protect messages in transit, without ownership of both clients (endpoints) we cannot guarantee what a third-party provider does with sent or received messages, and we therefore cannot make the same promise.”

As I have said multiple times—fully assured end-to-end encrypted messaging is a binary, not a spectrum. Without control of both endpoints, or some form of shared and mutually assurable endpoint security, it simply does not exist in the way that has become the new default for secure messaging.

Again, Meta is being open with its warning about those risks. “We believe it is essential that we give users transparent information about how interop works and how it differs from their chats with other WhatsApp or Messenger users… Users need to know that our security and privacy promise, as well as the feature set, won’t exactly match what we offer in WhatsApp chats.”

Endpoint compromise is the real vulnerability with end-to-end encrypted messaging, even where both endpoints are the same. If you can take over a device or trick a user into installing a dangerous app, then you can access the content on that device or endpoint.

Just as with any chain, the security of end-to-end encryption is only as good as its weakest link. Interoperability means that a threat actor doesn’t need to compromise a hyper-scale app, but could target the smaller, less protected alternatives as and when they start to show up in WhatsApp.

The only possible answer to this conundrum is trust. Theoretically, if you could absolutely attest to the integrity of an endpoint then you could share keys and run some form of proxy sealed platform. That might be possible with major apps—Signal, iMessage, Telegram even—but none of those are likely to play. The apps that do play will be smaller and won’t have those same assurances.

But, as Moore points out, “you can choose whether or not you participate in exchanging messages with third party apps,” adding that “it might be advisable to activate it only if necessary.”

Between these security risks and the lack of engagement—with the other major messengers not jumping onboard with WhatsApp, this update isn’t quite as exciting as billed. My recommendation is to stick to separate end-to-end encrypted messengers and don’t play games of mix and match.

Update 3/11: More than any other messaging platform—including iMessage, WhatsApp has become synonymous with end-to-end encryption. Meta’s platform has put it front and center in its marketing and social media campaigns. And so it’s little surprise that any form of compromise to the sanctity of that encryption generates headlines, attention and engagement.

It’s for that reason that a relatively modest change to the platform—which I first reported in early January—is now generating so much more attention (1,2,3). WhatsApp already confirms end-to-end encryption in specific chat information, but the latest change adds another label saying the same. This addition is in the form of a small tag beneath each of your contacts—appearing briefly before being replaced with the usual “last seen” information.

There are many reasons why WhatsApp would want to find additional real estate within its app to make this point—its ongoing battle with iMessage in the US, emphasizing that its RCS will not be end-to-end encrypted, or Google defaulting to RCS end-to-end encryption, but only for other Google users, for example. But now, with these latest interoperability changes, there’s a huge new angle.

The update was discovered—as ever with WhatsApp by WABetaInfo, which says that “with this enhancement, users are always aware when their chats are securely encrypted using the Signal protocol, serving as a visual confirmation that nobody can read their messages and listen to their calls.” The update is now rolling out to beta testers.

WhatApp doesn’t use the same open-source Signal protocol as Signal itself, but has its own variant. But the fact that WhatsApp is suddenly using the Signal banner much more publicly as a mark of quality for its encryption against the backdrop of interoperability is interesting in itself.

Will this new tag differ for third-party chats depending on whether they also use Signal’s protocol—unlikely; but it means that WhatsApp will be need to be clear as to how it defines end-to-end encryption and whether that includes endpoint assurance. From this latest warning, it seems that it will, and so third-party chats won’t carry the tag, but we will find out.

According to WABetaInfo, “this information helps users get an additional confirmation that their conversations are encrypted, further educating them about the security measures implemented by WhatsApp. We consider making the encryption status promptly visible at the top of the chat interface like a proactive approach to remind people regarding the security status of their conversations.”

That this modest update is now generating so much attention is interesting because it shows just how much user engagement there is in the entire encryption landscape, which again has implications for the rollout of DMA-mandated updates more widely.

We saw some of this three-years ago, when Meta (then Facebook) touted compromising WhatsApp’s privacy to better mine user data for marketing leads. The backlash became almost geopolitical and Meta backed down. Now, while Meta is being neutral in its portrayal of DMA, the warning within its engineering guide essentially spells out the compromises required.

Apple, for its part, went much further with its own DMA compliance document, warning of more drastic risks from weakening the walled garden around its billion iPhone-plus users.

“The DMA,” it warned, “requires changes to this system that bring greater risks to users and developers. This includes new avenues for malware, fraud and scams, illicit and harmful content, and other privacy and security threats. These changes also compromise Apple’s ability to detect, prevent, and take action against malicious apps on iOS and to support users impacted by issues with apps downloaded outside of the App Store.”

But while Apple has been much more forward in its response, Meta’s will come. Once we find out which other messaging platforms want to play with WhatsApp’s third-party chat feature, we’ll see how that’s presented to users and the outstanding questions around unique identifiers and privacy and end-to-end assurance will be much more clearly spelled out.

Talking of Apple, we will also see Meta’s response to iMessage getting its RCS veneer, which won’t be end-to-end encrypted anytime soon, as Meta and Apple battle for US messaging dominance.

And that brings us to the other area of real interest in this WhatsApp DMA story—Facebook Messenger. While WhatsApp generates all the headlines, Messenger is the quieter messaging giant in Meta’s stable, with approaching a billion users of its own.

Meta announced plans several years ago to bring WhatsApp and Messenger’s backends together—cue another backlash. At that time, Messenger was not end-to-end encrypted by default, that’s now changing. But even so, when I asked Meta if it planned to bring the two platforms together through interoperability, I was told “it’s not something we are working on.” I think that spells out clearly that WhatsApp is not going to do anything to compromise its apparent independence and security.

All told, the next few months will be the most interesting for the secure messaging landscape in years.

Share.
Exit mobile version