CYBER AWARENESS

CybersecuritySunday, March 1, 2026·7 min read

For discussion and awareness among friends and colleagues

CYBER AWARENESS

The Illusion of Secure Messaging

What Your Messaging App Knows About You

Telegram • WhatsApp • Signal

February 2026

For discussion and awareness among friends and colleagues

The Problem: Encryption ≠ Privacy

Most of us use messaging apps daily — for work, family, friends, and community. We see the "end-to-end encrypted" label and assume our conversations are private. This assumption is dangerously incomplete.

Encryption protects the content of your messages — the words you type. But it does not protect the metadata — the digital envelope around your message. And metadata often reveals more about you than the message itself.

Metadata includes: who you message, when, how often, for how long, your IP address, your device info, your location, and your network details. Think of it as: they cannot read your letter, but they are reading every detail on the envelope.

1. Telegram: Security Theater

Telegram markets itself as a secure messenger. The reality is more complicated.

The Default is Not Encrypted

Regular Telegram chats ("Cloud Chats") use client-server encryption, NOT end-to-end encryption. This means Telegram’s servers can access the contents of your messages. Only "Secret Chats" provide true end-to-end encryption, but most users never activate this feature because it is buried in the menu.

Every group chat on Telegram is visible to Telegram’s servers. Secret Chats are only available for one-on-one conversations, are device-specific, and are not synced across devices.

The Protocol is Non-Standard

Telegram uses its own proprietary MTProto 2.0 protocol instead of industry-standard encryption like TLS. Security researchers have found several cryptographic weaknesses and noted that the protocol falls short of guarantees provided by established protocols. The unconventional design choices make it harder to formally verify its security.

Infrastructure Concerns

A 2025 investigation found that key parts of Telegram’s network infrastructure were operated by companies with long-standing business ties to Russian state institutions, including the FSB (Federal Security Service). While this does not prove direct control, it raises serious questions about data sovereignty.

Pavel Durov’s Arrest

Telegram’s founder Pavel Durov was arrested in France in August 2024 and indicted on twelve charges including complicity in distribution of child exploitation material and drug trafficking. French prosecutors revealed that Telegram’s non-compliance with police requests had blocked 2,460 cases between 2013 and 2024. As of November 2025, his travel ban was lifted but the investigation continues.

FeatureTelegram Reality
Default EncryptionClient-server only — Telegram can read your messages
Group ChatsNever end-to-end encrypted
Secret ChatsE2E encrypted but hidden, device-specific, no groups
ProtocolProprietary MTProto 2.0 — non-standard, weaknesses found
Server CodeClosed source — cannot be independently verified

2. WhatsApp: The Metadata Machine

WhatsApp uses the Signal Protocol for end-to-end encryption, meaning your message content is genuinely protected. However, WhatsApp is owned by Meta (formerly Facebook), and the real value to Meta is not your messages — it is everything around them.

What WhatsApp Collects

Even with end-to-end encryption, WhatsApp records: your phone number, device info, IP address, who you message, when you message them, how frequently, call duration, your network details, browser info, ISP, and identifiers linked to other Meta products on the same device. Their privacy policy states they record "the time, frequency, and duration of your activities and interactions."

How Your Metadata is Used

1. Feeding the Ad Machine — If your WhatsApp is linked to Meta’s Accounts Center, your metadata is used for advertising across Facebook and Instagram. They do not need to read your messages. Knowing you contacted a lawyer at 2 AM, called a real estate agent three times, and frequently chat with someone in another city paints a complete picture.

2. Building Shadow Profiles — In late 2025, researchers from the University of Vienna exploited a Contact Discovery loophole to harvest metadata associated with up to 3.5 billion WhatsApp account identifiers. This was not a hack — it was a feature being abused.

3. Law Enforcement Access — WhatsApp is required by law to share metadata with authorities. An internal company memo acknowledged that ongoing "collect and correlate" attacks would break their intended privacy model. Without reading a single message, governments can map your entire social network.

4. Meta AI Integration — In 2025, Meta integrated its AI assistant directly into WhatsApp. Interactions with Meta AI are NOT end-to-end encrypted and are actively used for ad targeting. This was done without user consent, and users cannot disable or remove the feature.

5. Business Chat Exposure — When you message a business account using Meta’s services, once received, your message becomes subject to the business’s own privacy practices. Meta can use this data for marketing.

WhatsApp is a secure delivery truck driven by a surveillance company. The lock on the back door works, but the driver is writing down every address you visit. — Adapted from security researchers’ analogy

Why Shopee Knows What You Want

This is how targeted advertising works: Meta knows from WhatsApp who you talk to, when, and how often. It knows from Facebook and Instagram your interests, browsing habits through Meta Pixel embedded on millions of websites — including e-commerce platforms like Shopee and Lazada. Your device’s advertising ID ties everything together across apps.

You do not need to search for a product. Just messaging someone about it generates enough metadata signals for the algorithm to connect the dots. People think their phone is "listening." The reality is worse — it does not need to listen. It already knows.

3. Signal: The Gold Standard (With Caveats)

Signal is widely considered the most secure messaging app available. It is end-to-end encrypted by default for ALL conversations — messages, calls, groups, media. Even Signal itself cannot access your content.

When law enforcement serves Signal with a court order, all they can provide is: when the app was downloaded and when it was last used. Nothing else. They literally do not have your data.

Who Owns Signal

Signal is owned by the Signal Technology Foundation, a 501(c)(3) nonprofit. It was co-founded in 2018 by Moxie Marlinspike (cryptographer and creator of the Signal Protocol) and Brian Acton (co-founder of WhatsApp, who left Meta over disagreements about data monetization). Acton provided an initial $105 million at 0% interest, not due until 2068.

Signal has no advertisers, no investors, and can never be acquired by a tech company. It runs entirely on donations. The current president, Meredith Whittaker, is a vocal critic of surveillance capitalism.

The Sustainability Question

Signal spends approximately $40–50 million per year on operations but generates only about $2 million in real revenue. It survives on Acton’s initial endowment and user donations. This raises legitimate questions: Can a truly private messenger survive without a profit motive? If Signal collapses, what then?

Reasons for Healthy Skepticism

Signal’s predecessors received nearly $3 million from the US government-sponsored Open Technology Fund. As of 2025, the CIA installs Signal by default on employee devices. Why would intelligence agencies promote an app they cannot break into — unless the relationship is more nuanced than it appears?

Signal still requires your phone number to register, linking your identity to the service. And while their code is open source, you are still trusting that what runs on their servers matches the published code.

4. Side-by-Side Comparison

FeatureTelegramWhatsAppSignal
Default E2E Encryption✘ No (opt-in only)✔ Yes✔ Yes
Group Chat E2E✘ Never✔ Yes✔ Yes
Metadata CollectionModerateExtensiveMinimal
Data Shared with AdsNoYes (via Meta)No
Open Source (Client)✔ Yes✘ No✔ Yes
Open Source (Server)✘ No✘ No✔ Yes
OwnershipPrivate (Durov)Meta (Facebook)Nonprofit Foundation
Revenue ModelPremium + AdsMetadata → AdsDonations
Law Enforcement DataCloud chat content possibleFull metadataInstall date + last used
Phone Number Required✔ Yes✔ Yes✔ Yes

5. What You Can Do

Immediate Steps

For WhatsApp: Disconnect WhatsApp from Meta’s Accounts Center (Settings > Account Center). Disable link previews in sensitive chats. Do not interact with Meta AI. Enable Advanced Chat Privacy for each chat. Consider using a secondary number.

For Telegram: Use Secret Chats for sensitive one-on-one conversations. Do not assume group chats are private. Be aware that default chats are stored on and accessible by Telegram’s servers.

For truly sensitive communication: Use Signal. For absolute privacy, consider apps like Threema or SimpleX that do not require a phone number at all.

The Bigger Picture

Every platform you disconnect from is one less data source feeding the surveillance machine. Every smart device connected to the cloud is another data point in someone’s profile of you. The old saying holds true: if the service is free, you are the product.

The most secure conversation remains the one had face to face, with no devices in the room.

"They cannot read your letter, but they are reading every detail on the envelope. And the envelope tells them almost everything."

Sources

ESET Telegram Privacy Analysis (2025) • MTProto Security Analysis (Albrecht et al., EUROCRYPT 2025) • JOSA Telegram Security Report • Mozilla WhatsApp Privacy Review (2025) • TechRadar WhatsApp Metadata Analysis • University of Vienna Contact Discovery Research (2025) • Signal Foundation Wikipedia • France24 Durov Travel Ban Report • Pixel Defence WhatsApp Metadata Leak Report (2025)

This document is compiled for awareness and discussion purposes. It represents a synthesis of publicly available research and reporting as of February 2026. Readers are encouraged to verify claims independently and form their own conclusions.