

13·
4 days agoDid you run gpg yourself to generate the key pair, then exchange pub keys with your chat partner? Or did Facebook generate the keys for you from within a closed source application?
Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.


Did you run gpg yourself to generate the key pair, then exchange pub keys with your chat partner? Or did Facebook generate the keys for you from within a closed source application?


That made me lol so hard. Like what’s the fucking point of this thing when it comes up with shit like that?


I upgraded from an fx6300 to a Ryzen R5 1600 when they launched, and that was mind blowing. I can’t imagine what going from an fx6300 to an R5 in 2025 would feel like. That processor has been released 13 years before you upgrade, that’s impressive.
You’re misunderstanding what end-to-end encryption is. If they have a copy of your private key, it’s still end to end encrypted. The alternative would be akin to a TLS termination proxy, where your device would encrypt a message using Facebooks public key, they decrypt message, store it, and then Facebook uses your chat partners public key to encrypt and send to them. You cannot send an encrypted message straight through to your chat partner.
What I’m insinuating is that there’s no way to know if Facebook has a copy of your private key. The message is still end-to-end encrypted, it is encrypted by you using your chat partners public key, and passes through all of Facebooks infrastructure encrypted, until your chat partner receives and decrypts it. If Facebook stores the message, it’s stored encrypted. They can just decrypt it when subpoenaed or whenever they want bc they have the required private key.