Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Home/CyberSecurity News/WhatsApp’s ‘End-to-End Encryption by Default’ Claim Called
CyberSecurity News

WhatsApp’s ‘End-to-End Encryption by Default’ Claim Called

Telegram founder Pavel Durov has accused WhatsApp of what he calls “the biggest consumer fraud in history,” alleging its widely marketed end-to-end encryption (E2EE) claims are fundamentally...

Emy Elsamnoudy
Emy Elsamnoudy
April 13, 2026 3 Min Read
9 0

Telegram founder Pavel Durov has accused WhatsApp of what he calls “the biggest consumer fraud in history,” alleging its widely marketed end-to-end encryption (E2EE) claims are fundamentally misleading, thereby leaving the private messages of billions of users exposed on unencrypted cloud servers.

In a post published on April 9, 2026, Durov asserted that approximately 95% of private messages sent on WhatsApp are ultimately stored as plain-text backups on Apple iCloud and Google Drive servers, completely outside the scope of WhatsApp’s E2EE infrastructure.

The claim centers on a structural loophole that security researchers and digital rights organizations have flagged for years: while messages in transit between users are encrypted end-to-end, cloud backups of those messages are not encrypted by default.

WhatsApp does offer an opt-in encrypted backup feature, but it requires users to manually enable it within app settings and set either a strong password or a 64-digit encryption key. According to Durov, the vast majority of users never activate this feature, and even fewer use sufficiently strong passwords to protect their backups.

WhatsApp’s “E2E encryption by default” claim is a giant consumer fraud: ~95% of private messages on WhatsApp end up in plain-text backups on Apple/Google servers — not E2E-encrypted. Backup encryption is optional, and few people enable it — let alone use strong passwords.

— Pavel Durov (@durov) April 12, 2026

Pavel Durov Calls WhatsApp Encryption Claim Fraud

From a technical standpoint, the problem lies in how WhatsApp’s E2EE architecture terminates at the device level. When a user enables cloud backup, which is turned on by default, the decrypted message history is exported to Google Drive or Apple iCloud, where it is stored without end-to-end encryption unless the user has explicitly configured the E2EE backup option.

As Wire’s security blog notes, “If you back up your WhatsApp messages to Google Drive or iCloud, those backups are not protected by WhatsApp’s end-to-end encryption unless you explicitly enable encrypted backups, which is off by default.”

This means Apple, Google, and by extension, law enforcement agencies or malicious actors with access to those platforms, can potentially read those backups.

Durov further highlighted a compounding privacy failure: even if a user personally enables encrypted backups, their conversation partners, who may not have done the same, create their own unencrypted cloud copies of the same conversation. This renders individual E2EE backup adoption largely ineffective at scale.

The allegations are not solely Durov’s. A U.S. class-action lawsuit has been filed against Meta, alleging that WhatsApp contains a backdoor that grants Meta employees and third-party entities access to users’ private messages, directly contradicting WhatsApp’s public privacy assurances.

Meta has dismissed these allegations as “false and absurd,” but has not provided a detailed technical rebuttal addressing the backup architecture vulnerability.

The Electronic Frontier Foundation (EFF) has long warned that “unencrypted backups are vulnerable to government requests, third-party hacking, and disclosure by Apple or Google employees,” and has consistently advised users against backing up secure messenger conversations to the cloud.

Security professionals recommend the following immediate steps for WhatsApp users concerned about their privacy:

  • Enable E2EE backups in WhatsApp Settings → Chats → Chat Backup → End-to-end Encrypted Backup
  • Use a strong, unique password — not a PIN or biometric shortcut
  • Audit contact backup behavior, as conversations remain exposed if recipients have not enabled the same protection
  • Consider Signal for high-sensitivity communications, as it does not support cloud backup of message history by design

Durov claims that Telegram “has never disclosed a single byte of users’ messages in its 12+ year history,” positioning it as the privacy-first alternative. However, security experts note that Telegram’s regular chats are not end-to-end encrypted by default, either; only its “Secret Chats” feature uses E2EE, making it an imperfect counterexample in its own right.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

SecurityVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

OpenAI Urges macOS Users: Update ChatGPT & Warns Codex

Next Post

Critical WordPress Plugin Flaw Grants Admin Access Bypass

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us