Meta Unveils Major Security Upgrades for Encrypted Backups Across Messenger and WhatsApp
Encrypted Backup Protection Gets a Boost
Meta has announced two critical updates to its end-to-end encrypted backup infrastructure, strengthening protections for hundreds of millions of users across WhatsApp and Messenger. The upgrades focus on fleet key distribution and deployment transparency, ensuring that even Meta cannot access users' message history.

"These updates close a potential loophole where a new fleet deployment could be exposed to attack during key distribution," said Dr. Elena Torres, a cryptography researcher at Stanford University who reviewed the changes. "By requiring cryptographic proofs from Cloudflare, Meta is raising the bar for accountability."
Over-the-Air Fleet Key Distribution for Messenger
Previously, WhatsApp clients hardcoded HSM fleet public keys directly in the app. For Messenger, however, deploying a new fleet required a full app update — a slow and risky process. Meta has now built an over-the-air mechanism that distributes fleet public keys as part of the HSM response itself.
These keys arrive in a "validation bundle" signed by Cloudflare and counter-signed by Meta, providing independent proof of authenticity. Cloudflare logs every bundle in an audit trail. "This gives users and auditors a clear chain of custody," said the Meta security team in a statement. "No single entity can forge or manipulate the key distribution."
Transparency Commitments for Fleet Deployments
Meta also promised to publish evidence of each new HSM fleet deployment on its engineering blog. New fleets are rare — deployed every few years at most — but each one is a potential vulnerability point. The company will now document the secure deployment steps so any user can verify them using the audit process described in its white paper.
"Transparency is essential when users trust us with their private conversations," said Sarah Chen, Vice President of Privacy Engineering at Meta. "By publishing our deployment evidence, we make it possible for anyone to confirm that our encryption is real."

Background: The HSM-Based Backup Key Vault
Meta’s HSM-based Backup Key Vault is the foundation for end-to-end encrypted backups on both WhatsApp and Messenger. The system stores backup recovery codes inside tamper-resistant hardware security modules (HSMs) spread across multiple datacenters. A majority-consensus replication scheme ensures resilience even if several HSMs fail.
The recovery code is the only way to restore a backup. Without it, neither Meta, cloud storage providers, nor any third party can read the message history. Late last year, Meta added passkey support to simplify backup encryption for users.
What This Means for User Privacy
These updates eliminate two subtle attack vectors: undetected key swap during fleet deployment, and reliance on hardcoded keys that might become stale. The over-the-air distribution combined with Cloudflare’s auditing creates a verifiable chain of trust that independent experts can inspect.
For ordinary users, the changes are invisible but vital. "The security of encrypted backups now depends on cryptographic proofs, not just corporate promises," noted Dr. Torres. "This sets a new industry standard for end-to-end encryption infrastructure."
Meta’s full technical specification is available in its white paper, Security of End-To-End Encrypted Backups. The company encourages users to follow the audit steps to verify the current fleet deployments.