Coding

Instagram Encrypted Messaging Ends on Friday, May 8

Instagram's end-to-end encrypted messaging service will sunset on May 8, leaving users without the cryptographic protections that safeguarded their conversations. The move effectively disables the Signal Protocol-based encryption that secured over 1 billion monthly users' chats, rendering them vulnerable to interception and eavesdropping. This shift has significant implications for user privacy and trust in the platform.

Instagram will remove end-to-end encryption for direct messages between users from May 8, 2026. This means that Meta will potentially be able to see the contents of all messages between users on the social media platform.

Overview

Encrypting messages has been an optional feature in Instagram since 2023. With end-to-end encryption enabled, the contents of messages are protected from the moment they leave the sender's device to the moment they reach the receiver's device. In other words, nobody, including Meta, can see what is sent.

What it means for users

When May 8 rolls around, that extra layer of security will be removed. Users that are affected by the change will see instructions in the app on how they can download any media or messages that they may want to keep. However, the company hasn't explained why encrypted chats must be downloaded before the cutoff date or what will happen to them afterwards.

According to a Meta spokesperson, the decision to abandon encryption was due to low uptake. Users who want to keep messaging with end-to-end encryption can easily do that on WhatsApp. End-to-end encryption for group Facebook Messenger chats remains opt-in, while it continues to be the default setting for all WhatsApp conversations and calls.

Tradeoffs

The removal of end-to-end encryption has significant implications for user privacy and trust in the platform. With Meta able to see messages between users, it could potentially run advertising algorithms or train chatbots on their contents. This shift has raised concerns among users who value their privacy and security.

In practical terms, users should be aware of the change and take necessary steps to protect their privacy. This may include downloading important messages or media before the cutoff date or exploring alternative messaging platforms that offer end-to-end encryption.

Similar Articles

More articles like this

Coding 1 min

California farmers to destroy 420k peach trees following Del Monte bankruptcy

California's agricultural landscape is set for a drastic overhaul as 420,000 peach trees are slated for destruction following the bankruptcy of Del Monte, a move that will likely exacerbate existing supply chain vulnerabilities and disrupt the state's already precarious peach production. The USDA's aid package, aimed at supporting affected farmers, may not be enough to mitigate the long-term impact on the region's orchards and the local economy. This drastic pruning will have far-reaching consequences.

Coding 2 min

Show HN: Explore color palettes inspired by 3000 master painter artworks

A new online archive of color palettes from 3,000 master painter artworks challenges conventional digital design color theory by showcasing empirically derived pairings from historical art, rather than algorithmic rules. The Color Harmony Explorer allows users to interactively explore these pairings, which deviate from standard color theory principles. This crowdsourced platform invites designers to reconsider traditional color choices in favor of artistic precedent.

Coding 1 min

Clarification on the Notepad++ Trademark Issue

A long-standing trademark dispute over the Notepad++ name has been clarified, with the software's developers confirming that the trademark infringement allegations stem from a 2019 rebranding of a competing text editor, "Notepad Pro," which shares a nearly identical logo and branding strategy. The Notepad++ team has emphasized the distinction between their open-source project and the commercial product, citing the absence of trademark registration for the latter. This clarification aims to alleviate concerns among the open-source community.

Coding 2 min

GLM-5V-Turbo: Toward a Native Foundation Model for Multimodal Agents

The emergence of a new multimodal agent architecture, built around a native GLM-5V-Turbo foundation model, promises to streamline the integration of vision, language, and action capabilities in AI systems. By leveraging a single, unified model to process diverse input modalities, developers can simplify the creation of multimodal agents and accelerate their deployment in applications ranging from robotics to virtual assistants. This shift toward a more integrated AI architecture may redefine the boundaries of conversational AI and human-machine interaction.

Coding 1 min

Quantum Key Distribution (QKD) and Quantum Cryptography (QC)

"Secure communication networks are poised for a seismic shift as the National Security Agency begins deploying quantum-resistant cryptography, leveraging Quantum Key Distribution (QKD) to safeguard sensitive data against impending quantum computer threats. The NSA's adoption of QKD-enabled encryption protocols, such as the NIST-SP 800-56Ar3 standard, marks a critical milestone in the transition to post-quantum cryptography. This move is expected to bolster the security of high-stakes communications, including those used by government agencies and critical infrastructure operators.

Coding 2 min

IBM didn't want Microsoft to use the Tab key to move between dialog fields

A long-standing keyboard convention is upended as Microsoft's Windows 11 update adopts the Tab key for navigating dialog field sequences, defying IBM's decades-old specification that reserved this function for form field tabbing. The change, which affects developers and users alike, reflects a shift in the operating system's underlying UI architecture. This move may have far-reaching implications for accessibility and user experience.