How to Verify Your WhatsApp and Messenger Backups Are Truly End-to-End Encrypted

By • min read

Introduction

Meta has recently strengthened the security of end-to-end encrypted backups for WhatsApp and Messenger. Their system relies on a Hardware Security Module (HSM) based Backup Key Vault that stores recovery codes in tamper-resistant hardware, ensuring that neither Meta nor any third party can access your chat history. This guide will walk you through the key updates—over-the-air fleet key distribution for Messenger and the commitment to publish evidence of secure fleet deployments—and show you how to verify that your backups are protected.

How to Verify Your WhatsApp and Messenger Backups Are Truly End-to-End Encrypted
Source: engineering.fb.com

What You Need

Step-by-Step Guide

Step 1: Understand the Foundation – The HSM-Based Backup Key Vault

Before verifying, it helps to know how the system works. Meta’s HSM-based Backup Key Vault stores your recovery code inside tamper-resistant hardware security modules, distributed across multiple datacenters for resilience. This means your recovery code is never accessible to Meta or cloud storage providers. To start, read the whitepaper for a full technical specification.

Step 2: Check Your Backup Method – Passkey vs. Password

Late last year, Meta introduced passkeys as an easier way to activate end-to-end encrypted backups. If you use a password-based recovery code, ensure you have a strong, unique code. Go to your app’s backup settings:

If you see an option for a passkey (or “recovery code”), you are covered by the HSM vault.

Step 3: Verify Over-the-Air Fleet Key Distribution (Messenger)

For Messenger, Meta now distributes HSM fleet public keys over the air to avoid requiring app updates. This process ensures that the keys your Messenger app receives are genuine. Here’s how to verify them:

  1. When you set up an encrypted backup, the app will receive a validation bundle from the HSM fleet.
  2. This bundle is signed by Cloudflare and countersigned by Meta.
  3. Check that the bundle includes the Cloudflare signature. You can download the bundle and verify it using Cloudflare’s public key (available on Cloudflare’s website).
  4. Cloudflare maintains an audit log of every validation bundle. If you have concerns, you can request audit logs (see the whitepaper for details).

This step proves that the fleet key was issued by a trusted HSM fleet and hasn’t been tampered with.

Step 4: Review Published Evidence of Fleet Deployments

Meta now publishes evidence of each new HSM fleet deployment on their blog. This demonstrates that the system operates as designed and that Meta cannot access your backups. Follow these steps:

Since new fleets are deployed infrequently (every few years), this step is a one-time check for the current fleet.

How to Verify Your WhatsApp and Messenger Backups Are Truly End-to-End Encrypted
Source: engineering.fb.com

Step 5: Follow the Audit Steps in the Whitepaper

Meta’s whitepaper, “Security of End-To-End Encrypted Backups,” includes an Audit section that explains how any user can independently verify the system. Here’s a condensed version:

  1. Obtain the fleet key: Either from the hardcoded key in the WhatsApp app (if you use WhatsApp) or the over-the-air bundle (if you use Messenger).
  2. Fetch the published evidence: Download the signed evidence from Meta’s blog or the HSM fleet’s public endpoint.
  3. Verify signatures: Use the fleet key to verify the evidence’s signature.
  4. Check consistency: Ensure that the evidence matches the expected deployment configuration (e.g., number of HSMs, datacenter locations).

By following these steps, you can confirm that Meta’s infrastructure is secure and that your backup’s recovery code is protected.

Tips and Best Practices

By following this guide, you can ensure that your WhatsApp and Messenger backups remain truly private and end-to-end encrypted.

Recommended

Discover More

Inside Meta's High Court Battle Over UK Online Safety Fees: 8 Key FactsDebunking 5 Myths About Agentic Coding: The Real Risks Beneath the HypeMotorola's First Book-Style Foldable: The $1,900 Razr Fold with Snapdragon 8 Gen 5 and 6,000mAh BatteryEmergency Kernel 'Killswitch' Proposal Offers Rapid Vulnerability MitigationLegacy Graphics Hardware Gets a Modern Boost: Major Code Overhaul for Open-Source R300-R500 Radeon Driver Planned for 2026