this post was submitted on 25 Jun 2025
138 points (94.8% liked)
Technology
72440 readers
2442 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I'm interested in how they've allegedly achieved this working without anyone but you having access to the unencrypted messages.
Don't get me wrong, I want none of this shit in a messaging app, but I'm at least interested in how that is supposed to work.
From what I gather the texts are encrypted and sent to their LLMs that process it with some mechanism to verify the code being run in the cloud to process the texts is one that the WhatsApp app agreed to.
But they could just as well start siphoning the data after changing that code. Everyone will be able to see the cloud code changed if/when tbat happens but I don't think there's a way to differentiate that from a regular update.
Don't think theyve opensourced any of this
They might publish components of it enough to verify that the processing code is not emitting any data but as others said - it could've been done locally on the phone