WhatsApp now supports messages with third-parties

Martin Shelton

Principal Researcher

Electronic Frontier Foundation. (CC BY 2.0)

It’s the Digital Security Training team at Freedom of the Press Foundation (FPF), with security news that keeps you, your sources, and your devices safe. If someone has shared this newsletter with you, please subscribe here.

In the news

Under the new European Union law, the Digital Markets Act, Meta is required to allow interoperability between third-party chat software and its WhatsApp and Facebook Messenger apps. These tools offer end-to-end encryption using the Signal protocol, the strong encryption specifications pioneered by the Signal encrypted messaging app. According to Meta, this will be an opt-in feature to help mitigate against receipt of spam and scams from third-party integrations.

In its announcement, the company promoted the security benefits of the Signal protocol, preferring third parties use this protocol, but allowing other protocols besides Signal if they demonstrate they offer the same security guarantees. “To interoperate, third-party providers will sign an agreement with Messenger and/or WhatsApp and we’ll work together to enable interoperability,” Meta added. It is currently unclear if Signal will sign such an agreement. Read more here.

Get Notified. Take Action.

What you can do

  • In my experience, WhatsApp — with a user base of over 2 billion — suffers from a much bigger problem with spam and scams than Signal. And because it's unlikely third-party developers besides Signal can offer equivalent or better security guarantees (at least for now), we think this primarily makes a difference for users of Signal who may want to talk to people on WhatsApp. This might be handy if, say, you have a source or colleague who doesn't want to use Signal and spends a lot of time on WhatsApp.
  • While WhatsApp does use the Signal protocol, there are a lot of ways to inadvertently leak data from WhatsApp beyond the app. For example, WhatsApp has a fun habit of encouraging you to back up your conversations to Meta in a format legible to the company. Likewise, you might be inadvertently leaking photos received through WhatsApp outside of the app. This potentially affects anyone you talk to on third-party apps as well. So if you are a WhatsApp user and want to maximize protections, read our guide to upgrading WhatsApp security.
  • Compared to WhatsApp, Signal users by default can be more certain that they are not leaking data beyond the app. But you can still tighten its settings even further. Read our guide to locking down Signal.

Updates from our team

  • We’re working to improve the usability of our website. The purpose of this study, created by our design partners at Wide Eye, is to understand how we can make the FPF website easier to use and improve content organization. The study itself is a series of tasks where you choose links that you think answer the question. There are no wrong answers, and you’ll have the opportunity to provide additional feedback at the end. If you want to help us improve, participate in the short study survey here.

Our team is always ready to assist journalists with digital security concerns. Reach out here, and stay safe and secure out there.



Donate to support press freedom

Your support is more important than ever.

Read more about Digital Security Digest

What to do about AT&T breach

Around 110 million AT&T subscribers were affected by a data breach from May 1 to Oct. 31, 2022, TechCrunch reported.

Massive Authy leak, plus Proton Docs

The parent company for Authy, an application for two-factor authentication, has issued a critical security update to its Android and iOS users. According to BleepingComputer, hackers utilized leaked phone numbers from past data breaches to identify up to 33 million Authy users.

Eavesdropping on AirPods?

Apple released a firmware update patching a critical Bluetooth vulnerability in AirPods, AirPods Pro, AirPods Max, Powerbeats Pro, and Beats Fit Pro. According to its support page, an adversary in Bluetooth range could spoof as an intended source device for these wireless headphones. When the targeted headphones send a connection request to the spoofed device, it could eavesdrop on confidential conversations.