As evidence, the lawsuit cites unnamed “courageous whistleblowers” who allege that WhatsApp and Meta employees can request to view a user’s messages through a simple process, thus bypassing the app’s end-to-end encryption. “A worker need only send a ‘task’ (i.e., request via Meta’s internal system) to a Meta engineer with an explanation that they need access to WhatsApp messages for their job,” the lawsuit claims. “The Meta engineering team will then grant access – often without any scrutiny at all – and the worker’s workstation will then have a new window or widget available that can pull up any WhatsApp user’s messages based on the user’s User ID number, which is unique to a user but identical across all Meta products.”

“Once the Meta worker has this access, they can read users’ messages by opening the widget; no separate decryption step is required,” the 51-page complaint adds. “The WhatsApp messages appear in widgets commingled with widgets containing messages from unencrypted sources. Messages appear almost as soon as they are communicated – essentially, in real-time. Moreover, access is unlimited in temporal scope, with Meta workers able to access messages from the time users first activated their accounts, including those messages users believe they have deleted.” The lawsuit does not provide any technical details to back up the rather sensational claims.

  • CeeBee_Eh@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    8
    ·
    11 hours ago

    Any claims around E2EE is pointless, since it’s impossible to verify.

    This is objectively false. Reverse engineering is a thing, as is packet inspection.

    • snowboardbumvt@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      10 hours ago

      Reverse engineering is theoretically possible, but often very difficult in practice.

      I’m not enough of an expert in cryptography to know for sure if packet inspection would allow you to tell if a ciphertext could be decrypted by a second “back door” key. My gut says it’s not possible, but I’d be happy to be proven wrong.

      • black0ut@pawb.social
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        9 hours ago

        Hell, as far as I know, E2EE would be indistinguishable from client to server encryption, where the server can read everything without the need for a secret “backdoor key”. You can see that the channel is encrypted, but you can’t know who has the other key.

        • herseycokguzelolacak@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 hours ago

          The easiest way to break E2EE is to copy your private key to Meta’s servers. It’s very easy to implement, and close to impossible to detect.

    • Sinthesis@lemmy.today
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      10 hours ago

      Now you just need Meta to allow you on their networks to inspect packets and reverse engineer their servers because as far as I know, WhatsApp messages are not P2P.

      /edit I betcha $5 that the connection from client to server is TLS(https), good luck decrypting that to see what its payload is.