Feisty Duck - Cryptography & Security Newsletter #134

Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.


Practical TLS and PKI Training

Practical TLS and PKI Training is for system administrators, developers, and IT security professionals who wish to learn how to deploy secure servers and encrypted web applications and understand the theory and practice of Internet PKI. Based on our book Bulletproof TLS and PKI. Upcoming dates: US timezones 23-26 March 2026, EU timezones 14-17 April 2026


Messaging Encryption Has Come a Long Way, but Falls Short

We’ve had a pretty good couple of years when it comes to messaging security. Initially, adopting encryption stopped passive surveillance. Later, adoption of end-to-end encryption by the dominant platforms gave us much needed privacy. Some platforms, such as Apple and Signal, even led the way when it comes to resilience against cryptographically relevant quantum computers. Compare this situation to the poor state of email encryption, and the difference is like night and day. Despite this, some structural problems remain, and we’re even in danger of regressing.

At a glance, end-to-end encryption (E2EE) is widely available, but if we look closely, we see many gaps:

  • Apple users enjoy E2EE with post-quantum safety. Unfortunately, Apple doesn’t encrypt phone backups by default, which puts iMessage content in their hands and unprotected. Upgrading to Advanced Data Protection (ADP) fixes this, but it’s not effective when messages exist in the backups of all people involved in the communication chain.
  • Android users also enjoy E2EE, although the protocol is yet to be upgraded with post-quantum cryptography. Google encrypts Android backups by default.
  • Signal users enjoy E2EE with post-quantum safety. Signal wisely decided to exclude its data from backup on iOS, keeping the messages safe. Unfortunately, this means that your messages are not backed up, but there is an optional and fully encrypted paid service available from Signal directly.
  • WhatsApp is also in the E2EE club, with the work on post-quantum safety still in progress. WhatsApp has the same problem with backups on iOS. Encrypted backup is available as an option, but that’s not really helpful unless you get all your contacts to do the same.

We are, unfortunately, in a place where we cannot rely on native platform messaging for secure communication. Interoperability can probably be fixed, at least between Apple and Google. Apple is currently working on implementing the latest Rich Communication Services (RCS) standard that comes with E2EE based on the MLS standard (RFC 9420). To achieve interoperable end-to-end security, we’d also need Apple to change its stance on encrypting backups.

However, it’s the centralized implementation of messaging that represents the biggest problem. It’s a huge and defining structural issue. The centralization puts valuable messages in the hands of the vendors and makes them a very juicy target; they are in the crosshairs of commercial entities, legislators, law enforcement, and interest groups. None of them can be trusted when it comes to privacy. So we have a problem: The centralized implementations have made it possible to innovate and improve quickly, but they’ve also become chokepoints that can lead to breaking security for everyone at a stroke.

Even in the best case, where the encryption is left alone and by some miracle there are no backdoors, the fact that the metadata is concentrated in a few locations is a substantial problem.

Signal is the best option if you want reliable security, but the platform is not popular enough; good luck convincing every one of your friends to use it. Signal also has the problem of being run by only one entity. On the positive side, its clients are open source, and there is even a reproducible build for Android. This goes a long way toward transparency. The other platforms have to be continuously reverse engineered, which is a much more demanding effort.

There isn’t going to be an easy way out of this situation. No one has been able to build a robust, usable, and widely adopted E2EE solution for messaging. It’s a significant challenge, and many with smaller ambitions have failed as well. Is the current compromise and constant battle among the conflicting pulling forces the best we can do?

What’s Going on in the World Right Now?

  • In the EU, Chat Control has been on the agenda for most of 2025. The fight for privacy is less intense this year, but continues nevertheless.
  • In Russia, many messenger platforms are banned or restricted, with the government pushing the state-developed Max chat application. Just this week, they opened a criminal case into Telegram founder Pavel Durov.
  • In the UK, Apple users are not able to enable Advanced Data Protection because of a standoff between Apple and the UK government.
  • In the US, there is a new lawsuit against WhatsApp, alleging that its E2EE claims are a sham. Matthew Green has written a great blog post that goes into some detail about the lawsuits and shares some thoughts on trust. Meta, given its inherent incentives and history, cannot be trusted. Generally speaking, we shouldn’t need to trust corporations to enjoy privacy.
  • Apple is being sued because it “prioritized user privacy over child safety for years,” as is Meta.
  • Apple and Google are starting to test RCS interoperability.
  • Group membership in messaging applications remains a rough edge. WhatsApp servers, for example, can add anyone to the conversation, which makes targeted surveillance trivial. Signal has a better story here, as the protocol requires that someone already in the conversation endorses the new arrivals.
  • Key verification remains the weakest point when real security is required. Key transparency is a great initiative, but can we trust the closed-source clients to do the right thing?
  • Off-device AI assistance is a new attack vector. It breaks E2EE by sharing message data with someone who is not the intended recipient. Meta claims to have implemented this feature in a privacy-preserving manner using trusted execution environments (TEEs), but it’s not something we can reliably verify.
  • Age-verification requirements are spreading, with Discord announcing compliance most recently. Governments were too quick to legislate; they should have first explored and ensured that this is a problem that can be solved in a satisfactory and privacy-preserving manner.
  • The FBI reportedly couldn’t get into a Washington Post reporter’s iPhone because it was in lockdown mode. They did, however, gain access to the reporter’s laptop by forcing them to use their fingerprint. Inside, they accessed the available Signal messages (disappearing messages had been enabled).

Short News

Copyright © 2026 Feisty Duck Ltd

86-90 Paul Street, London EC2A 4NE, United Kingdom
www.feistyduck.com / hello@feistyduck.com

You are receiving this email because you are subscribed to the Cryptography & Security Newsletter (previously Bulletproof TLS Newsletter). If you'd prefer not to receive further emails, please unsubscribe here.