CYBER-TECH | Lock & promise: Why WhatsApp’s encryption is on trial

NAVEEN A | 6 hours ago
CYBER-TECH | Lock & promise: Why WhatsApp’s encryption is on trial

In the digital age, the padlock is the most ubiquitous icon of the virtual world. For over three billion users of WhatsApp, the small yellow bubble appearing at the top of their chats—assuring them that “no one outside of this chat, not even WhatsApp, can read or listen”—is a foundational promise of digital life. Yet, in a federal courtroom in northern California, a group of international plaintiffs is arguing that this security is less an absolute shield than a comforting illusion. 

Allegations against Meta

The class-action lawsuit, filed in January 2026, alleges that Meta, WhatsApp’s parent company, has for years misled the public regarding the sanctity of its “end-to-end” protection. The core of the complaint rests on testimony from whistleblowers who describe a mundane, bureaucratic bypass: a Meta employee allegedly need only submit a “task” through an internal system to be granted access to a tool that displays a user’s private communications. Meta has dismissed the suit as a “work of fiction” and is threatening sanctions against the lawyers involved. For a company that has pinned its future on a pivot to privacy, the legal challenge is an existential test of its corporate word. 

How end-to-end encryption works

To understand the controversy, one must separate the mathematics of the lock from the mechanics of the house it protects. WhatsApp uses the Signal Protocol, an open-source standard widely regarded by cryptographers as the gold standard for secure communication. In theory, end-to-end encryption (E2EE) means that the “keys” to a conversation exist only on the participants’ handsets. When a message travels across the internet, it is gibberish to everyone—including the courier.  

Experts remain deeply sceptical of the lawsuit’s central claim that this protocol has been systemically broken. Breaking the Signal Protocol would be the cryptographic equivalent of discovering that the laws of physics are optional; it would likely have been detected by the global community of researchers who audit the code. However, the lawsuit implies the existence of a client-side access pathway—less a cryptographic backdoor than a privileged endpoint exception. This theoretical bypass would involve the app accessing data after it has been decrypted on the user’s device but before it is read, effectively “exfiltrating” the content to Meta’s servers. While technologically possible, no public technical evidence has yet substantiated that such a mechanism actually exists in WhatsApp’s production code. 

The hidden power of metadata

This is where the privacy fault lines become most treacherous. Even if the encryption remains mathematically sound, the “system design” around it often leaks like a sieve. Edward Snowden, a polarising but influential critic of state surveillance, has long warned that the real danger lies not in the breaking of codes, but in the collection of metadata. WhatsApp knows whom you talk to, for how long, from where, and how often. To a government or a sophisticated advertiser, this “social graph” is often as revealing as the content of the messages themselves.  

Furthermore, the average user’s privacy is frequently compromised by their own desire for convenience. Unless specifically enabled, WhatsApp backups stored on third-party cloud services are typically not end-to-end encrypted; they sit in the cloud, accessible to the hosting company or law enforcement with a subpoena. Then there is the “report” function: when a user flags a message for abuse, a plaintext snippet of the conversation is forwarded to Meta’s moderators. These are not “hacks” in the traditional sense, but intentional features that create a significant gap between marketing rhetoric and functional reality.  

The controversy highlights a fundamental divide in the market for secure messaging. On one side are commercial giants like Meta, which must balance privacy against the demands of regulators and the complexities of content moderation at scale. On the other are non-profits like Signal. Signal’s architecture is built on “data minimisation”—it stores almost nothing, ensuring that when a government comes knocking, there is no digital haul to hand over. Meta, by contrast, links WhatsApp accounts to phone numbers and increasingly integrates them into its broader advertising ecosystem. The incentive for a trillion-dollar company is to know its users; the incentive for a non-profit is to remain as ignorant of them as possible. 

What the lawsuit really changes

The California lawsuit may ultimately fail for lack of technical proof, but it has already succeeded in damaging the “privacy-first” narrative Meta has carefully cultivated. The case shifts the central question of the encrypted era. The problem is no longer whether the mathematics of encryption work; they do. The question is what “private” truly means when trust depends on the opaque internal governance of a multi-billion-dollar institution rather than the transparent laws of mathematics. For those who find the whistleblowers’ claims even remotely plausible, the lesson is clear: an algorithm that cannot see is always more reliable than a company that merely promises to keep its eyes shut.

(The writer is the founder & CEO of Shweta Labs)

Share this