WhatsApp now supports messages with third-parties

Martin Shelton

Principal Researcher

Electronic Frontier Foundation. (CC BY 2.0)

It’s the Digital Security Training team at Freedom of the Press Foundation (FPF), with security news that keeps you, your sources, and your devices safe. If someone has shared this newsletter with you, please subscribe here.

In the news

Under the new European Union law, the Digital Markets Act, Meta is required to allow interoperability between third-party chat software and its WhatsApp and Facebook Messenger apps. These tools offer end-to-end encryption using the Signal protocol, the strong encryption specifications pioneered by the Signal encrypted messaging app. According to Meta, this will be an opt-in feature to help mitigate against receipt of spam and scams from third-party integrations.

In its announcement, the company promoted the security benefits of the Signal protocol, preferring third parties use this protocol, but allowing other protocols besides Signal if they demonstrate they offer the same security guarantees. “To interoperate, third-party providers will sign an agreement with Messenger and/or WhatsApp and we’ll work together to enable interoperability,” Meta added. It is currently unclear if Signal will sign such an agreement. Read more here.

What you can do

  • In my experience, WhatsApp — with a user base of over 2 billion — suffers from a much bigger problem with spam and scams than Signal. And because it's unlikely third-party developers besides Signal can offer equivalent or better security guarantees (at least for now), we think this primarily makes a difference for users of Signal who may want to talk to people on WhatsApp. This might be handy if, say, you have a source or colleague who doesn't want to use Signal and spends a lot of time on WhatsApp.
  • While WhatsApp does use the Signal protocol, there are a lot of ways to inadvertently leak data from WhatsApp beyond the app. For example, WhatsApp has a fun habit of encouraging you to back up your conversations to Meta in a format legible to the company. Likewise, you might be inadvertently leaking photos received through WhatsApp outside of the app. This potentially affects anyone you talk to on third-party apps as well. So if you are a WhatsApp user and want to maximize protections, read our guide to upgrading WhatsApp security.
  • Compared to WhatsApp, Signal users by default can be more certain that they are not leaking data beyond the app. But you can still tighten its settings even further. Read our guide to locking down Signal.

Updates from our team

  • We’re working to improve the usability of our website. The purpose of this study, created by our design partners at Wide Eye, is to understand how we can make the FPF website easier to use and improve content organization. The study itself is a series of tasks where you choose links that you think answer the question. There are no wrong answers, and you’ll have the opportunity to provide additional feedback at the end. If you want to help us improve, participate in the short study survey here.

Our team is always ready to assist journalists with digital security concerns. Reach out here, and stay safe and secure out there.



Donate to support press freedom

Your support is more important than ever.

Read more about Digital Security Digest

Apple warns iPhone users of targeted malware

On April 10, Apple sent users in 92 countries warning of mercenary malware attacks targeting the iPhone. The notification did not provide details about the identities of the attackers. According to TechCrunch, Apple warned, “This attack is likely targeting you specifically because of who you are or what you do. Although it’s never possible to achieve absolute certainty when detecting such attacks, Apple has high confidence in this warning — please take it seriously.”

Preparing for election-related security issues

Throughout this year, our digital security training team will share our thoughts on navigating security issues during the 2024 election season. Elections around the world experience distinct security issues that may change from year to year, but in the U.S. we look to 2020 for lessons on how to get ahead of likely issues, from surveillance of our sensitive communications to perennial phishing attacks and harassment for political reporting.

Google to delete old Chrome Incognito data

Following a class-action lawsuit over Google’s handling of user data in its Chrome browser’s “Incognito” private browsing mode, the search company will expunge “billions of event-level data records that reflect class members’ private browsing activities” improperly collected before January 2024. It also updated its Incognito landing page to highlight that even Google can discern your activities in private browsing mode. Additionally, the company will be required to delete data that makes users’ private browsing data personally identifiable, such as IP addresses.