WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.1K

Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps.

The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr.

Source Property of the People The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People.

“As of November2020, the FBl’s ability to legally access secure content on leading messaging applications is depicted below, including details on accessible information based on-the applicable legal process. Return data provided by the companies listed below, with the exception of WhatsApp, are actually logs of latent data that are provided to law enforcement in a non-real-time manner and may impact investigations due to delivery delays.” reads the document. The information reported in the training documents provides an up to date picture of the abilities of law enforcement in accessing the content of popular messaging apps.

Feds cannot access the message content for Signal, Telegram, Threema, Viber, WeChat, and Wickr, while they can gain limited access to the content of encrypted communications from iMessage, Line, and WhatsApp.

Anyway, depending on the single encrypted messaging apps, law enforcement could extract varying metadata that could allow unmasking the end-users.

Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps. The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr. Source Property of the People The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People. “As of November2020, the FBl’s ability to legally access secure content on leading messaging applications is depicted below, including details on accessible information based on-the applicable legal process. Return data provided by the companies listed below, with the exception of WhatsApp, are actually logs of latent data that are provided to law enforcement in a non-real-time manner and may impact investigations due to delivery delays.” reads the document. The information reported in the training documents provides an up to date picture of the abilities of law enforcement in accessing the content of popular messaging apps. Feds cannot access the message content for Signal, Telegram, Threema, Viber, WeChat, and Wickr, while they can gain limited access to the content of encrypted communications from iMessage, Line, and WhatsApp. Anyway, depending on the single encrypted messaging apps, law enforcement could extract varying metadata that could allow unmasking the end-users.

(post is archived)

[–] 3 pts

The next slide is how they read messages anyway

[–] 0 pt

Bingo. "Legally" hasn't stopped anyone in Government since it's conception. It just placates the normie sheep.

[–] 2 pts

Signal is the only one they can't actually read due to it's ratchet style encryption. Signal has been asked multiple times to provide message data under subpoena and they can't because they don't host the data, nor can they decrypt it.

[–] 2 pts

That document tells me what you said, and only what you said. When making a legal request for information, these applications can (or will) provide this data.

Reading between the lines tells me they probably have access to everything they need (including content) but they can't legally say that. Nothing online is secure, it's only a matter of how high of a value the content is as to if it's broken.

[–] 1 pt (edited )

Nothing electronic is secure.

"legally' is the key word here. Echelon is quite illegal, and used extensively. (comms net)

Just using encrypted apps will put you under higher scrutiny.. And then. how long until they backdoor your device? Its common knowledge that BIOS on all intel chips is completely compromised. We're talking kernel level here.