frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Antirender: remove the glossy shine on architectural renderings

https://antirender.com/
1617•iambateman•20h ago•398 comments

NASA's WB-57 crash lands at Houston

https://arstechnica.com/space/2026/01/one-of-nasas-three-wb-57-aircraft-just-did-a-belly-landing-...
74•verzali•3d ago•21 comments

We have ipinfo at home or how to geolocate IPs in your CLI using latency

https://blog.globalping.io/we-have-ipinfo-at-home-or-how-to-geolocate-ips-in-your-cli-using-latency/
120•jimaek•7h ago•37 comments

CPython Internals Explained

https://github.com/zpoint/CPython-Internals
25•yufiz•4d ago•0 comments

Guix System First Impressions as a Nix User

https://nemin.hu/guix.html
62•todsacerdoti•5h ago•13 comments

Quaternion Algebras

https://jvoight.github.io/quat.html
51•teleforce•4d ago•19 comments

Nvidia's 10-year effort to make the Shield TV the most updated Android device

https://arstechnica.com/gadgets/2026/01/inside-nvidias-10-year-effort-to-make-the-shield-tv-the-m...
39•qmr•1h ago•26 comments

Show HN: I trained a 9M speech model to fix my Mandarin tones

https://simedw.com/2026/01/31/ear-pronunication-via-ctc/
350•simedw•15h ago•111 comments

My Ridiculously Robust Photo Management System (Immich Edition)

https://jaisenmathai.com/articles/my-ridiculously-robust-photo-management-system-immich-edition/
127•jmathai•3d ago•51 comments

Euro firms must ditch Uncle Sam's clouds and go EU-native

https://www.theregister.com/2026/01/30/euro_firms_must_ditch_us/
504•jamesblonde•6h ago•439 comments

Sumerian Star Map Recorded the Impact of an Asteroid (2024)

https://archaeologyworlds.com/5500-year-old-sumerian-star-map-recorded/
105•griffzhowl•9h ago•35 comments

A Step Behind the Bleeding Edge: A Philosophy on AI in Dev

https://somehowmanage.com/2026/01/22/a-step-behind-the-bleeding-edge-monarchs-philosophy-on-ai-in...
105•Ozzie_osman•2d ago•41 comments

US reportedly investigate claims that Meta can read encrypted WhatsApp messages

https://www.theguardian.com/technology/2026/jan/31/us-authorities-reportedly-investigate-claims-t...
117•echelon_musk•3h ago•95 comments

Insane Growth Goldbridge (YC F25) Is Hiring a Forward Deployed Engineer

https://www.ycombinator.com/companies/goldbridge/jobs/78gGEHh-forward-deployed-engineer
1•alvinsalehi•4h ago

Peerweb: Decentralized website hosting via WebTorrent

https://peerweb.lol/
309•dtj1123•19h ago•107 comments

Moltbook

https://www.moltbook.com/
1587•teej•1d ago•740 comments

"Giving up upstream-ing my patches & feel free to pick them up"

https://mail.openjdk.org/pipermail/hotspot-dev/2026-January/118080.html
22•csmantle•5h ago•9 comments

Implementing the Transcendental Functions in Ivy

https://commandcenter.blogspot.com/2026/01/implementing-transcendental-functions.html
19•chmaynard•5d ago•1 comments

HTTP Cats

https://http.cat/
476•surprisetalk•1d ago•79 comments

Show HN: Phage Explorer

https://phage-explorer.org/
101•eigenvalue•11h ago•22 comments

An anecdote about backward compatibility

https://blog.plover.com/2026/01/26/#wrterm
70•speckx•4d ago•15 comments

Surely the crash of the US economy has to be soon

https://wilsoniumite.com/2026/01/27/surely-it-has-to-be-soon/
433•Wilsoniumite•1d ago•544 comments

Kimi K2.5 Technical Report [pdf]

https://github.com/MoonshotAI/Kimi-K2.5/blob/master/tech_report.pdf
345•vinhnx•23h ago•132 comments

Naples' 1790s civil war was intensified by moral panic over Real Analysis (2023)

https://lareviewofbooks.org/article/foundational-anxieties-modern-mathematics-and-the-political-i...
80•OgsyedIE•12h ago•19 comments

Disrupting the largest residential proxy network

https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-net...
193•cdrnsf•2d ago•186 comments

CERN accepts $1B in private cash towards Future Circular Collider

https://physicsworld.com/a/cern-accepts-1bn-in-private-cash-towards-future-circular-collider/
88•zeristor•6h ago•63 comments

Designing a Passively Safe API

https://www.danealbaugh.com/articles/passively-safe-apis
53•dalbaugh•4d ago•15 comments

Show HN: SF Microclimates

https://github.com/solo-founders/sf-microclimates
44•weisser•5d ago•35 comments

The engineer who invented the Mars rover suspension in his garage [video]

https://www.youtube.com/watch?v=QKSPk_0N4Jc
360•UltraSane•4d ago•54 comments

Archyl – The modern platform for C4 model documentation

https://www.archyl.com/
19•eko•4d ago•5 comments
Open in hackernews

US reportedly investigate claims that Meta can read encrypted WhatsApp messages

https://www.theguardian.com/technology/2026/jan/31/us-authorities-reportedly-investigate-claims-that-meta-can-read-encrypted-whatsapp-messages
115•echelon_musk•3h ago

Comments

ralusek•1h ago
I mean at the very least if their clients can read it then they can at least read it through their clients, right? And if their clients can read it’ll be because of some private key stored on the client device that they must be able to access, so they could always get that. And this is just assuming that they’ve been transparent about how it’s built, they could just have backdoors on their end.
basch•1h ago
they can also just .. brute force passwords. the pin to encrypt fb messenger chat is 6 digits for example.
farbklang•46m ago
but that is a pin and can be rate limited / denied, not a cryptograhpic key that can be used to brute force and compare hash generations (?)
barbazoo•40m ago
They likely wouldn’t rate limit themselves, rate limiting only applies when you access through their cute little enter your pin UI.
solenoid0937•3m ago
The PIN is used when you're too lazy to set an alphanumeric pin or offload the backup to Apple/Google. Now sure, this is most people, but such are the foibles of E2EE - getting E2EE "right" (eg supporting account recovery) requires people to memorize a complex password.

The PIN interface is also an HSM on the backend. The HSM performs the rate limiting. So they'd need a backdoor'd HSM.

mrtksn•1h ago
I wonder how these investigations go? Are they just asking them if it is true? Are they working with IT specialist to technically analyze the apps? Are they requesting the source code that can be demonstrated to be the same one that runs on the user devices and then analyze that code?
TZubiri•1h ago
Anyone can audit the client binaries
mattmaroon•1h ago
That will be step 1. Fear of being caught lying to the government is such that that is usually enough. Presumably at least a handful of people would have to know about it, and nobody likes their job at Facebook enough to go to jail over it.

But you never know.

hsuduebc2•55m ago
Companies lie to governments and the public all the time. I doubt that even if something were found and the case were lost, it would lead to prison or any truly severe punishment. No money was stolen and no lives were put at risk. At worst, it would likely end in a fine, and then it would be forgotten, especially given Meta’s repeated violations of user trust.

The reality is that most users do not seem to care. For many, WhatsApp is simply “free SMS,” tied to a phone number, so it feels familiar and easy to understand, and the broader implications are ignored.

mattmaroon•17m ago
Martha Stewart went to jail for lying to the government. The fact that there would be no punishment is why they would tell the truth.

The government is pretty harsh when they find out you lied under oath. Corporate officers do not lie to the government frequently.

RenThraysk•1h ago
Multiple governments will already know as they have analyzed and reverse engineered it.
Ms-J•1h ago
Who do they expect to fall for the claims that a Facebook owned messenger couldn't read your "encrypted" messages? It's truly funny.

Any large scale provider with headquarters in the USA will be subject to backdoors and information sharing with the government when they want to read or know what you are doing.

mattmaroon•1h ago
I think you can safely remove “in the USA” from that sentence.
hsuduebc2•1h ago
I do not believe them either. The swift start of the investigation by U.S. authorities only suggests there was no obstacle to opening one, not that nothing could be found. By “could not,” I mean it is not currently possible to confirm, not that there is necessarily nothing there.

Personally, I would never trust anyone big enough that it(in this case Meta) need and want to be deeply entangled in politics.

kgwxd•1h ago
They're only concerned someone at meta, they don't already control, could read their personal messages.
huijzer•55m ago
I have reached the point that I think even the chat control discussion might be a distraction because essentially they can already get anything. Yeah government needs to fill in a form to request, but that’s mostly automated I believe
j45•34m ago
Such initiatives are likely trying to make it easier.
gruez•14m ago
>I have reached the point that I think even the chat control discussion might be a distraction because essentially they can already get anything.

Then why are politicians wasting time and attracting ire attempting pushing it through? Same goes for UK demanding backdoors. If they already have it, why start a big public fight over it?

rdtsc•40m ago
> Any large scale provider with headquarters in the USA will be subject to backdoors

Wonder what large scale provider outside USA won’t do that?

Aurornis•37m ago
> Any large scale provider with headquarters in the USA will be subject to backdoors and information sharing with the government when they want to read or know what you are doing.

Not just the USA. This is basically universal.

j45•35m ago
It's not guaranteed or by default.

This type of generalized defeatism does more harm than not.

embedding-shape•31m ago
No, assuming that anything besides what you can verify yourself is compromised isn't "defeatism", although I'd agree that it's overkill in many cases.

But for your data you want to absolutely keep secret? It's probably the only to guarantee someone else somewhere cannot see it, default to assume if it's remote, someone will eventually be able to access it. If not today, it'll be stored and decrypted later.

Aurornis•31m ago
> It's not guaranteed or by default.

Nation state governments do have the ability to coerce companies within their territory by default.

If you think this feature is unique to the USA, you are buying too much into a separate narrative. All countries can and will use the force of law to control companies within their borders when they see fit. The USA actually has more freedom and protections in this area than many countries, even though it’s far from perfect.

> This type of generalized defeatism does more harm than not.

Pointing out the realities of the world and how governments work isn’t defeatism.

Believing that the USA is uniquely bad and closing your eyes to how other countries work is more harmful than helpful.

Ms-J•20m ago
This is correct. Yes, every government has the ability to use violence and coerce, but that takes coordination among other things. There are still places, and areas within those places, where enforcement and the ability to keep it secret is almost not possible.
olalonde•30m ago
Me? I'd be very surprised if they can actually read encrypted messages (without pushing a malicious client update). The odds that no one at Meta would blow the whistle seem low, and a backdoor would likely be discovered by independent security researchers.
riazrizvi•26m ago
If there is such a back door, it would hardly follow it's widely known within the company. From the sparse reports on why Facebook/Meta has been caught doing this in the past, it's for favor trading and leverage at the highest levels.
nindalf•21m ago
I'd be surprised as well. I know people who've worked on the WhatsApp apps specifically for years. It feels highly unlikely that they wouldn't have come across this backdoor and they wouldn't have mentioned it to me.

Happy to bet $100 that this lawsuit goes nowhere.

Snoozus•3m ago
Is there an independent audit of the Whatsapp client and of the servers?
preisschild•29m ago
> Any large scale provider with headquarters in the USA will be subject to backdoors and information sharing with the government when they want to read or know what you are doing.

Thats just wrong. Signal for example is headquartered in the US and does not even have this capability (besides metadata)

david_allison•1h ago
It was my understanding that the backups are unencrypted. Is that still the case?
evanjrowley•1h ago
On Android, if you allow it to backup to your Google cloud storage, it will say the backups are encrypted. That was my experience when I set it up a few weeks ago.

Exactly who has the ability to decrypt the backup is not totally clear.

It may be a different situation for non-Android users, Android users who are not signed in with a Google account, Android users who are not using Google Play Services, etc.

bayindirh•1h ago
You can explore your Google Cloud's Application Storage part via Rsync, AFAIK. So you can see whether your backups are encrypted or not.

I remember that you had to extract at least two keys from the android device to be able to read "on-device" chat storage in the days of yore, so the tech is there.

If you don't have the keys' copies in the Google Drive side, we can say that they are at least "superficially" encrypted.

londons_explore•1h ago
I want whatsapp to decrypt the messages in a secure enclave and render the message content to the screen with a secure rendering pipeline, as is done with DRM'ed video.

Compromise of the client side application or OS shouldn't break the security model.

This should be possible with current API's, since each message could if needed simply be a single frame DRM'ed video if no better approach exists (or until a better approach is built).

Retr0id•1h ago
Signal uses the DRM APIs to mitigate threats like Microsoft Recall, but it doesn't stop the app itself from reading its own data.

I don't really see how it's possible to mitigate client compromise. You can decrypt stuff on a secure enclave but at some point the client has to pull it out and render it.

willis936•1h ago
By avoiding untrustworthy clients. All Windows devices should be considered compromised after last year.
Retr0id•1h ago
That's not mitigating client compromise, that's a whole other thing - trying to construct an uncompromiseable client.

You don't build defense-in-depth by assuming something can't be compromised.

willis936•1h ago
Clients can always be compromised. I'm not talking about a client that can't be compromised, but simply a client that is not compromised out-of-the-box.
Retr0id•1h ago
That seems orthogonal to the subject of this discussion, i.e. "Compromise of the client side application or OS shouldn't break the security model."
GraemeMeyer•1h ago
Why last year?
willis936•59m ago
Windows recall, intrusive addition of AI features (is there even a pinky promise that they're not training on user data?), more builtin ads, and less user control (most notably the removal of using the OS without an account - something that makes sense in the context of undisclosed theft of private information).

This was 2025. I'm excited for what 2026 will bring. Things are moving fast indeed.

cobertos•58m ago
Windows has been sending usage history back to their servers for longer than just last year
HumblyTossed•1h ago
This. The gap in E2E is the point at which I type in clear text and the point at which I read clear text. Those can be exploited.
bogwog•53m ago
> I don't really see how it's possible to mitigate client compromise

Easy: pass laws requiring chat providers to implement interoperability standards so that users can bring their own trusted clients. You're still at risk if your recipient is using a compromised client, but that's a problem that you have the power to solve, and it's much easier to convince someone to switch a secure client if they don't have to worry about losing their contacts.

xvector•32m ago
You seem to think the government wants your messages to be private and would "pass laws" to this effect.

Methinks you put far too much faith in the government, at least from my understanding of the history of cybersecurity :)

londons_explore•33m ago
> don't really see how it's possible to mitigate client compromise.

Think of the way DRM'ed video is played. If the media player application is compromised, the video data is still secure. Thats because the GPU does both the decryption and rendering, and will not let the application read it back.

Retr0id•27m ago
Video decryption+decoding is a well-defined enough problem that you can ship silicon that does it. You can't do the same thing for the UI of a social media app.

You could put the entire app within TrustZone, but then you're not trusting the app vendor any less than you were before.

Retr0id•20m ago
Although now I think about it more, you could have APIs for "decrypt this [text/image] with key $id, and render it as a secure overlay at coordinates ($x, $y)"
pennomi•22m ago
There will always, ALWAYS be the analog hole in security models like this.
OtherShrezzing•1h ago
This is what a layman would assume happens from Meta’s WhatsApp advertising. They show the e2e process, and have the message entirely unreadable by anyone but the phone owner.
kevin_thibedeau•1h ago
e2e means unreadable by a middleman. That is a small inconvenience if you can readily compromise an endpoint.
Almondsetat•1h ago
People keep talking about e2ee as if it was some brain-to-brain encoding that truly allowed only the recipient person to decrypt the message
dijit•56m ago
because it used to be that the ends and the middlemen were different entities.

In the universe where they are the same entity (walled-gardens) there is only the middleman.

In such cases you either trust them or you don’t, anything more is not required because they can compromise their own endpoints in a way you can not detect.

znpy•1h ago
I always assumed this to be true, to be honest.

Nowadays all of the messaging pipeline on my phone is closed source and proprietary, and thus unverifiable at all.

The iPhone operating system is closed, the runtime is closed, the whatsapp client is closed, the protocol is closed… hard to believe any claim.

And i know that somebody’s gonna bring up the alleged e2e encryption… a client in control of somebody else might just leak the encryption keys from one end of the chat.

Closed systems that do not support third party clients that connect through open protocols should ALWAYS be assumed to be insecure.

solenoid0937•11m ago
It doesn't need to be open source for us to know what it's doing. It's been RE'd. Its properties are well understood by the security community.

> a client in control of somebody else might just leak the encryption keys from one end of the chat.

Has nothing to do with closed/open source. Preventing this requires remote attestation. I don't know of any messaging app out there that really does this, closed or open source. Also, ironically remote attestation is the antithesis of open source.

josefrichter•1h ago
I am not into conspiracy theories, but I find it very unlikely that our governments can’t read all our messages across platforms.
miohtama•1h ago
Both things cannot be true at the same time

- WhatsApp encryption is broken

- EU's and UK's Chat Control spooks demand Meta to insert backdoor because they cannot break the encryption

The Guardian has its own editorial flavour on tech news, so expect them to use any excuse to bash the subject.

dyauspitr•57m ago
They’re just not sharing the back door with the EU?
Retric•55m ago
Just because Adam has a back door doesn’t mean Eve also has a back door.
preisschild•19m ago
> EU's and UK's Chat Control spooks demand Meta to insert backdoor because they cannot break the encryption

Those are not law, so no the EU doesnt demand that

cosmicgadget•57m ago
> “We look forward to moving forward with those claims and note WhatsApp’s denials have all been carefully worded in a way that stops short of denying the central allegation in the complaint – that Meta has the ability to read WhatsApp messages, regardless of its claims about end-to-end encryption.”

My money is on the chats being end to end encrypted and separately uploaded to Facebook.

random3•38m ago
That’s because they have such a good track record wrt to privacy? https://www.docketalarm.com/cases/California_Northern_Distri...
guerrilla•15m ago
> My money is on the chats being end to end encrypted and separately uploaded to Facebook.

This is what I've suspected for a long time. I bet that's it. They can already read both ends, no need to b0rk the encryption. It's just them doing their job to protect you from fourth parties, not from themselves.

varenc•15m ago
If this was happening en-masse, wouldn't this be discovered by the many people reverse engineering WhatsApp? Reverse engineering it is hard sophisticated work, but given how popular WhatsApp is plenty of independent security researchers are doing it. I'm quite skeptical Meta could hide some malicious code in WhatsApp that's breaking the E2EE without it being discovered.
gruez•11m ago
>being end to end encrypted and separately uploaded to Facebook

That's a cute loophole you thought up, but whatsapp's marketing is pretty unequivocal that they can't read your messages.

>With end-to-end encryption on WhatsApp, your personal messages and calls are secured with a lock. Only you and the person you're talking to can read or listen to them, and no one else, not even WhatsApp

https://www.whatsapp.com/

That's not to say it's impossible that they are secretly uploading your messages, but the implication that they could be secretly doing so while not running afoul of their own claims because of cute word games, is outright false.

blibble•4m ago
> but whatsapp's marketing is pretty unequivocal that they can't read your messages.

well that's alright then

facebook's marketing and executives have always been completely above board and completely honest

gruez•3m ago
Read the rest of my comment?

>That's not to say it's impossible that they are secretly uploading your messages, but the implication that they could be secretly doing so while not running afoul of their own claims because of cute word games, is outright false.

matthewdgreen•6m ago
I really doubt this. Any such upload would be visible inside the WhatsApp application, which would make it the world's most exciting (and relatively straightforward) RE project. You can even start with a Java app, so it's extra easy.
calibas•56m ago
It's vulnerable to man-in-the-middle attacks, and the man-in-the-middle happens to be Meta.

The tricky part would be doing it and not getting caught though.

oldestofsports•56m ago
Surprised pikachu face
oefrha•52m ago
I always assumed Meta has backdoor that at least allows them to compromise key individuals if men in black ask, but law firm representing NSO courageously defending the people? Come the fuck on.

> Our colleagues’ defence of NSO on appeal has nothing to do with the facts disclosed to us and which form the basis of the lawsuit we brought for worldwide WhatsApp users.

zugi•6m ago
> I always assumed Meta has backdoor that at least allows them to compromise key individuals if men in black ask

According to Meta's own voluntarily published official statements, they do not.

* FAQ on encryption: https://faq.whatsapp.com/820124435853543

* FAQ for law enforcement: https://faq.whatsapp.com/444002211197967

These representations are legally binding. If Meta were intentionally lying on these, it would invite billions of dollars of liability. They use similar terminology as Signal and the best private VPN companies: we can't read and don't retain message content, so law enforcement can't ask for it. They do keep some "meta" information and will provide it with a valid subpoenoa.

The latter link even clarifies Meta's interpretation of their responsibilities under "National Security Letters", which the US Government has tried to use to circumvent 4th amendment protections in the past:

> We interpret the national security letter provision as applied to WhatsApp to require the production of only two categories of information: name and length of service.

I guess we'll see if this lawsuit goes anywhere or discovery reveals anything surprising.

renegade-otter•52m ago
Anyone trusting Facebook to follow basic human decency and, yes, laws, is a fool.
Forgeties79•36m ago
They got caught torrenting unbelievable amounts of content, an act that committed even just a few times can get my home Internet shut down with no recourse (best outcome). Literally nothing happened. Combine the fact that nothing legally significant ever happens to them with zuckerburg’s colossal ego and complete lack of ethical foundation, and you have quite the recipe.

And I’m not even getting into the obvious negative social/political repercussions that have come directly from Facebook and their total lack of accountability/care. They make the world worse. Aside from the inconvenience for hobbyist communities and other groups, all of which should leave Facebook anyway, we would lose nothing of value if Facebook was shut down today. The world would get slightly better.

bayarearefugee•26m ago
> Literally nothing happened.

The true wealthy live by an entirely different set of rules than the rest of us, especially when they are willing to prostrate themselves to the US President.

This has always been true to some degree, but is both more true than ever (there used to be some limits based on accepted decorum) plus they just dont even try to hide it anymore.

xvector•36m ago
Anyone blindly believing every random allegation is also a fool, especially when the app in question has been thoroughly reverse engineered and you can freely check for yourself that it's using the same protocol as Signal for encryption
xvector•41m ago
What even are these low effort, uninformed conspiratorial comments saturating the comment section?

Sure, Meta can obviously read encrypted messages in certain scenarios:

- you report a chat (you're just uploading the plaintext)

- you turn on their AI bot (inference runs on their GPUs)

Otherwise they cannot read anything. The app uses the same encryption protocol as Signal and it's been extensively reverse engineered. Hell, they worked with Moxie's team to get this done (https://signal.org/blog/whatsapp-complete/).

The burden of proof is on anyone that claims Meta bypassing encryption is "obviously the case."

I am really tired of HN devolving into angry uninformed hot takes and quips.

AndrewKemendo•39m ago
If your personal threat model at this point is not literally:

“everything I ever do can be used against me in court”

…then you are not up-to-date with the latest state of society

Privacy is the most relevant when you are in a position where that information is the difference between your life or your death

The average person going through their average day breaks dozens of laws because the world is a Kafkaesque surveillance capitalist society.

The amount of information that exists about there average consumer is so unbelievably godly such that any litigator could make an argument against nearly any human on the planet that they are in violation of something if there is enough pressure

If you think you’re safe in this society because you “don’t do anything wrong“ then you’re compromised and don’t even realize it

jijji•38m ago
if anybody believes that Facebook would allow people to send a totally encrypted message to somebody, they're out of their mind. they're pretty much in bed with law enforcement at this point. I mean I don't know how many people have been killed in Saudi Arabia this year for writing Facebook messages to each other that were against what the government wanted but it's probably a large number.
xvector•22m ago
This reads like another low effort conspiratorial comment.

WhatsApp has been reverse engineered extensively, they worked with Moxie's team to implement the same protocol as Signal, and you can freely inspect the client binaries yourself!

If you're confident this is the case, you should provide a comment with actual technical substance backing your claims.

kachapopopow•36m ago
yes, this is a very known fact that it is not E2EE but Client2Server Encrypted. Otherwise your message history wouldn't work.
codexetreme•35m ago
Might be a rookie question. But exactly why would chat history not work?
ryanscio•28m ago
It would, just not on new devices without moving keys via already-trusted device. This is what WhatsApp presumably does
xvector•34m ago
This is a total misunderstanding of how E2EE works.

I need to either enter my password or let the app access my iCloud Keychain to let it derive the backup encryption key.

It's also well known that they worked with the Moxie's team to implement the same E2EE protocol as Signal. So messages are E2EE as well.

alex1138•31m ago
Zuck didn't buy it in good faith. It wasn't "we'll grow you big by using our resources but be absolutely faithful to the privacy terms you dictate". Evidence: Brian Acton very publically telling people that they (Zuck, possibly Sandberg) reneged

Zuck thinks we're "dumb fucks". That's his internet legacy. Copying products, buying them up, wiping out competition

timpera•30m ago
Lots of uninformed conspiratorial comments with zero proof in here, but I'd really like WhatsApp to get their encryption audited by a reliable, independent 3rd party.
nindalf•15m ago
This reads like a nothingburger. Couple of quotes from the article:

> the idea that WhatsApp can selectively and retroactively access the content of [end-to-end encrypted] individual chats is a mathematical impossibility

> Steven Murdoch, professor of security engineering at UCL, said the lawsuit was “a bit strange”. “It seems to be going mostly on whistleblowers, and we don’t know much about them or their credibility,” he said. “I would be very surprised if what they are claiming is actually true.”

No one apart from the firm filing the lawsuit is actually supporting this claim. A lot of people in this thread seem very confident that it's true, and I'm not sure what precisely makes them so confident.

Snoozus•5m ago
I find this wording also "a bit strange".

It is not a mathematical impossibility in any way.

For example they might be able to read the backups, the keys might be somehow (accidentaly or not) leaked...

And then the part about Telegram not having end2end encryption? What's this all about?

modeless•13m ago
Meanwhile Apple has always been able to read encrypted iMessage messages and everyone decided to ignore that fact. https://james.darpinian.com/blog/apple-imessage-encryption
gruez•8m ago
>has always been able to read encrypted iMessage messages

...assuming you have icloud backups enabled, which is... totally expected? What's next, complaining about bitlocker being backdoored because microsoft can read your onedrive files?

modeless•3m ago
If you read the link you would know that contrary to your expectation other apps advertising E2EE don't allow the app maker to read your messages. And turning off backups doesn't help when everyone else has them enabled.
razingeden•5m ago
[delayed]
oncallthrow•10m ago
This should surprise nobody. Do you really think that the intelligence agencies of the US etc would allow mainstream E2E encryption? Please stop being so naive
vbezhenar•8m ago
Whatsapp is considered insecure and banned from use for military in Russia. Telegram, on the other hand, is widely used. Of course that's not something definitive, but just a food for thought.
gruez•6m ago
> but just a food for thought.

...that telegram is backdoored by the russians? The implication you're trying to make seems to be that russians must be choosing telegram because it's secure, but are ignoring the possibility that they're choosing telegram because they have access to it. After all, you think they want the possibility of their military scheming against them?