<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Haven Messenger</title>
    <description>The latest articles on Forem by Haven Messenger (@havenmessenger).</description>
    <link>https://forem.com/havenmessenger</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3891528%2F1736c7dd-a6a7-443a-863c-0abb7d56e358.png</url>
      <title>Forem: Haven Messenger</title>
      <link>https://forem.com/havenmessenger</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/havenmessenger"/>
    <language>en</language>
    <item>
      <title>What End-to-End Encryption Actually Protects (And What It Doesn'''t)</title>
      <dc:creator>Haven Messenger</dc:creator>
      <pubDate>Sat, 25 Apr 2026 23:14:07 +0000</pubDate>
      <link>https://forem.com/havenmessenger/what-end-to-end-encryption-actually-protects-and-what-it-doesnt-1p5d</link>
      <guid>https://forem.com/havenmessenger/what-end-to-end-encryption-actually-protects-and-what-it-doesnt-1p5d</guid>
      <description>&lt;p&gt;What end-to-end encryption protects — and what it misses — is one of the most important distinctions in practical security. This is a technical breakdown.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Precise Definition
&lt;/h2&gt;

&lt;p&gt;End-to-end encryption (E2EE) means a message is encrypted on the sender's device, travels encrypted through all intermediaries, and is decrypted only on the recipient's device. No server in the path — not the service provider's infrastructure, not your ISP — can read the content.&lt;/p&gt;

&lt;p&gt;This is genuinely powerful. Even if Signal's servers are compromised, even if a government serves a lawful demand, even if your traffic is intercepted at a coffee shop — the message content is unreadable to anyone except the intended recipient.&lt;/p&gt;

&lt;p&gt;What it does &lt;em&gt;not&lt;/em&gt; mean: using an E2EE app makes you private. These are different claims with a significant gap between them.&lt;/p&gt;




&lt;h2&gt;
  
  
  How It Actually Works: The Signal Protocol
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Key Exchange (X3DH)
&lt;/h3&gt;

&lt;p&gt;Before two parties can exchange encrypted messages, they need to establish a shared secret without transmitting it. The Signal Protocol uses X3DH (Extended Triple Diffie-Hellman).&lt;/p&gt;

&lt;p&gt;Each user generates several key pairs at registration:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Each user generates at registration:
IK  = Identity Key       (long-term, never changes)
SPK = Signed PreKey      (rotated periodically, signed by IK)
OPK = One-Time PreKey    (consumed once per session, then discarded)

# The server holds public keys only.
# Private keys never leave your device.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When Alice wants to message Bob, she fetches Bob's public keys from the server and performs a series of Diffie-Hellman operations combining her private keys with his public keys. This produces a shared secret that Bob can derive independently — but that no third party who observed the exchange can compute.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Double Ratchet: Forward Secrecy
&lt;/h3&gt;

&lt;p&gt;Forward secrecy means compromising today's keys doesn't decrypt past messages. Signal achieves this by generating a new encryption key for every single message:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Each message advances the ratchet
message_key_1 = KDF(chain_key_0)
message_key_2 = KDF(chain_key_1)
message_key_3 = KDF(chain_key_2)

# Each key is used once, then deleted.
# Compromise of message_key_3 reveals nothing
# about message_key_1 or message_key_2.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;An attacker who stores your encrypted messages today cannot decrypt them even if they obtain your private key in the future — the keys that decrypted those messages have already been deleted.&lt;/p&gt;

&lt;h3&gt;
  
  
  Group Messaging: MLS (RFC 9420)
&lt;/h3&gt;

&lt;p&gt;The Double Ratchet scales to two-party conversations. Group messaging is harder. Traditional approaches encrypt to each member individually — sender work scales linearly with group size.&lt;/p&gt;

&lt;p&gt;RFC 9420, the Messaging Layer Security (MLS) protocol, solves this with a binary tree key structure:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# MLS tree structure — 4-member group
          root_secret
         /            \
    left_secret    right_secret
    /       \       /        \
 Alice    Bob    Carol      Dave

# Adding Eve: only the path from Eve's leaf to root updates.
# Everyone derives the new root from their existing subtree secret.
# O(log n) operations instead of O(n).
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;MLS also provides &lt;strong&gt;post-compromise security&lt;/strong&gt;: if a member's device is compromised, they can be healed back to security through key rotation — the attacker cannot read future messages once the member rotates keys.&lt;/p&gt;




&lt;h2&gt;
  
  
  What E2EE Protects
&lt;/h2&gt;

&lt;p&gt;✅ &lt;strong&gt;Server compromise&lt;/strong&gt; — An attacker who breaches the service provider obtains ciphertext they cannot decrypt.&lt;/p&gt;

&lt;p&gt;✅ &lt;strong&gt;Network interception&lt;/strong&gt; — Traffic captured in transit is unreadable without the recipient's private key.&lt;/p&gt;

&lt;p&gt;✅ &lt;strong&gt;Service provider access&lt;/strong&gt; — The provider cannot read message content even under legal compulsion. There is nothing readable to hand over.&lt;/p&gt;

&lt;p&gt;✅ &lt;strong&gt;Historical messages&lt;/strong&gt; — With forward secrecy, past messages remain encrypted even after future key compromise.&lt;/p&gt;




&lt;h2&gt;
  
  
  What E2EE Does Not Protect
&lt;/h2&gt;

&lt;p&gt;❌ &lt;strong&gt;Metadata&lt;/strong&gt; — Who you communicate with, when, how often, and from where are visible to the service provider and the network. E2EE encrypts the payload, not the envelope. [General Michael Hayden, former NSA/CIA director, was not exaggerating when he said "we kill people based on metadata."]&lt;/p&gt;

&lt;p&gt;❌ &lt;strong&gt;Endpoint compromise&lt;/strong&gt; — If an attacker controls either device — malware, physical access, compromised OS — they read plaintext before encryption or after decryption. E2EE only protects data in transit.&lt;/p&gt;

&lt;p&gt;❌ &lt;strong&gt;Key distribution attacks&lt;/strong&gt; — A service provider who controls the key directory can substitute an attacker's key for your contact's. You would encrypt to the attacker thinking you're encrypting to your contact. This is why Signal has "safety numbers" and PGP has key fingerprints. In practice, almost no users verify them.&lt;/p&gt;

&lt;p&gt;❌ &lt;strong&gt;Identity linkage&lt;/strong&gt; — If your account requires a phone number, your encrypted communications are linked to your carrier identity. E2EE says nothing about who you are, only that what you said is private.&lt;/p&gt;

&lt;p&gt;⚠️ &lt;strong&gt;Stored messages&lt;/strong&gt; — E2EE applies to transmission. If messages are backed up to cloud storage without E2EE (pre-2022 iCloud backups of iMessage), the backup is the vulnerability.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Key Distribution Problem
&lt;/h2&gt;

&lt;p&gt;The most underappreciated weakness in E2EE deployments: you have to actually encrypt to the right key. How does your app know the key it fetched for &lt;code&gt;alice@example.com&lt;/code&gt; belongs to Alice?&lt;/p&gt;

&lt;p&gt;In practice, most users trust the key server. Signal's server tells Bob's client what your key is. If Signal's server were compromised or malicious, it could substitute an attacker's key — Bob's client would silently encrypt to the attacker.&lt;/p&gt;

&lt;p&gt;The cryptographic solution is out-of-band key verification — comparing fingerprints in person or over a phone call. Signal calls these "safety numbers." PGP calls them key fingerprints. Almost no users do this.&lt;/p&gt;

&lt;p&gt;This is not theoretical. Law enforcement and intelligence agencies have legal mechanisms to compel service providers to serve modified key material to specific targets. A well-designed E2EE system makes this &lt;em&gt;detectable&lt;/em&gt; — key changes trigger alerts — but only if the user notices.&lt;/p&gt;




&lt;h2&gt;
  
  
  Zero-Knowledge Architecture Goes Further
&lt;/h2&gt;

&lt;p&gt;E2EE protects messages &lt;em&gt;in transit&lt;/em&gt;. Zero-knowledge architecture extends protection to &lt;em&gt;stored data&lt;/em&gt;: your messages, email, and files are encrypted before leaving your device, using keys derived from your passphrase that the server never sees.&lt;/p&gt;

&lt;p&gt;The difference matters: an E2EE app that stores encrypted history on its servers has protected messages in transit, but the server holds ciphertext it can hand to a third party. A zero-knowledge system means the server has ciphertext and &lt;em&gt;no ability to derive the keys&lt;/em&gt; — even a lawful demand for the encrypted data produces data that cannot be decrypted without the user's passphrase.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Practical Checklist
&lt;/h2&gt;

&lt;p&gt;When evaluating a "secure" messaging or email product, the right questions are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Is encryption on by default?&lt;/strong&gt; Opt-in encryption (Telegram's Secret Chats) is not a privacy feature — it's a disclaimer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Who controls the key directory?&lt;/strong&gt; Can the server substitute keys without detection?&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Is key verification available and surfaced to users?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;What metadata does the provider collect?&lt;/strong&gt; Who-to-whom, when, and how often are often more revealing than content.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Does it require a phone number?&lt;/strong&gt; A phone number is a carrier-issued identifier that links your identity to billing records.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Is stored data zero-knowledge, or just transit-encrypted?&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;E2EE is necessary. It is not sufficient. The gap between "encrypted in transit" and "actually private" is where most practical attacks live.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Haven implements end-to-end encryption for chat (MLS/RFC 9420) and zero-knowledge encryption for stored email (client-side PGP). No phone number required. &lt;a href="https://havenmessenger.com" rel="noopener noreferrer"&gt;havenmessenger.com&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>encryption</category>
      <category>privacy</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Your Encrypted App Has a Leak. It's Called Metadata.</title>
      <dc:creator>Haven Messenger</dc:creator>
      <pubDate>Fri, 24 Apr 2026 20:39:03 +0000</pubDate>
      <link>https://forem.com/havenmessenger/your-encrypted-app-has-a-leak-its-called-metadata-10oc</link>
      <guid>https://forem.com/havenmessenger/your-encrypted-app-has-a-leak-its-called-metadata-10oc</guid>
      <description>&lt;p&gt;In 2014, General Michael Hayden — former director of both the NSA and the CIA — made a remark that should have ended the "I use an encrypted app so I'm fine" line of reasoning. "We kill people based on metadata," he said. He meant it literally: drone targeting decisions had been made on communication patterns alone, with no access to message content.&lt;/p&gt;

&lt;p&gt;Most people's threat model is considerably less dramatic. But the principle scales all the way down: &lt;strong&gt;metadata is a surprisingly complete record of your life, and encrypting message content leaves it entirely intact&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Metadata Actually Is
&lt;/h2&gt;

&lt;p&gt;Every message you send produces two distinct categories of information. The first is &lt;em&gt;content&lt;/em&gt; — the words, files, and images in the message itself. The second is everything else:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Who&lt;/strong&gt; you communicated with&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;When&lt;/strong&gt; — date, time, and duration&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;How often&lt;/strong&gt; — frequency and rhythm of contact&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;From where&lt;/strong&gt; — IP address, which resolves to city, ISP, and often precise location&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;On what device&lt;/strong&gt; — hardware identifiers, OS version, app version&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network conditions&lt;/strong&gt; — which cell tower, which Wi-Fi network&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;End-to-end encryption protects the first category. The second category is produced &lt;em&gt;before&lt;/em&gt; encryption is applied and &lt;em&gt;after&lt;/em&gt; it's removed — it exists at the transport layer, visible to every intermediary between you and the recipient.&lt;/p&gt;

&lt;h2&gt;
  
  
  What a Metadata Record Reveals
&lt;/h2&gt;

&lt;p&gt;A 2016 Stanford research project called &lt;em&gt;MetaPhone&lt;/em&gt; asked 800 volunteers for their phone call metadata — just the numbers called and the call times, nothing else. Researchers found they could accurately identify:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Participants calling a cardiac arrhythmia specialist, then a medical device manufacturer → inferred: heart condition requiring a pacemaker&lt;/li&gt;
&lt;li&gt;Participants calling a gun shop, then a background check service → inferred: firearm purchase
&lt;/li&gt;
&lt;li&gt;Participants whose call patterns to a spouse dropped off while calls to a specific number increased → inferred: affair&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These inferences came from phone call metadata alone, with no access to what was said. &lt;strong&gt;Messaging apps generate richer metadata than phone calls.&lt;/strong&gt; The conclusions that can be drawn are correspondingly more precise.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Phone Number Problem
&lt;/h2&gt;

&lt;p&gt;Signal's cryptography is excellent. Its metadata handling is a different story.&lt;/p&gt;

&lt;p&gt;Using Signal requires a phone number. That number ties your Signal account to your carrier's records. Your carrier knows every number you've ever called or texted, timestamped, with tower location data. In the US, law enforcement can obtain these records with a &lt;em&gt;subpoena&lt;/em&gt; — a significantly lower legal bar than a search warrant.&lt;/p&gt;

&lt;p&gt;Signal introduced usernames in 2024 partly to address this, allowing users to share a username instead of a phone number with contacts. But the phone number is still required to create an account, still held by Signal, and still the underlying identity. The username is a display layer over the same infrastructure.&lt;/p&gt;

&lt;p&gt;More fundamentally: every time you send a Signal message, your device contacts Signal's servers to deliver it. Signal knows when you are active, at what times, and with what frequency. Signal has published strong statements about the limits of what they log, and their track record of responding to law enforcement demands is genuinely good. But &lt;strong&gt;"trust us, we don't log that" is a policy, not a cryptographic guarantee&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Service Provider Problem
&lt;/h2&gt;

&lt;p&gt;The same dynamic applies to encrypted email services. ProtonMail encrypts your message content — they genuinely cannot read your emails. But ProtonMail's servers receive your connection, process your session, and route your messages. They know:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Your IP address at login (unless you use a VPN or Tor)&lt;/li&gt;
&lt;li&gt;Exactly when you send and receive messages&lt;/li&gt;
&lt;li&gt;Who you correspond with (recipient addresses are metadata, not content)&lt;/li&gt;
&lt;li&gt;The size of each message&lt;/li&gt;
&lt;li&gt;Your login frequency and session duration&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In 2021, ProtonMail received a Swiss court order requiring them to log the IP address of a French climate activist. They complied — they were transparent that Swiss law could require this. The activist had assumed "encrypted email" meant "anonymous." &lt;strong&gt;It does not.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The core distinction: encryption protects your content from ProtonMail reading your emails. It does not protect your metadata from ProtonMail's servers receiving it. These are fundamentally different problems.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Metadata Minimization Actually Requires
&lt;/h2&gt;

&lt;p&gt;Reducing your metadata exposure requires more than choosing an encrypted app:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;An identity that isn't your phone number.&lt;/strong&gt; A phone number is a permanent, carrier-issued identifier tied to your billing address. Using it as your messaging identity links every conversation to that record. Email addresses can be created pseudonymously, aliased, and separated from your real identity in ways phone numbers cannot.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Aliases for compartmentalization.&lt;/strong&gt; Using a single identifier for all communication creates a single point of aggregation. Multiple aliases — one per relationship, purpose, or context — fragment the picture, making pattern aggregation dramatically harder.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IP address protection.&lt;/strong&gt; Your IP address reveals your location and ISP. For high-sensitivity communication, routing through a trusted VPN or Tor is the only reliable mitigation. No messaging app can fix this on its own.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technical controls over policy controls.&lt;/strong&gt; "We don't log" is a promise. Zero-knowledge architecture — where the server literally cannot decrypt your data — is meaningfully stronger than a logging policy. The latter can change; the former is a cryptographic constraint.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Honest Answer for Most People
&lt;/h2&gt;

&lt;p&gt;If your threat model is "I don't want Facebook reading my messages," Signal or iMessage are fine. E2EE handles that adversary cleanly.&lt;/p&gt;

&lt;p&gt;If your threat model is "I don't want someone with legal authority over my service provider to be able to map my communication patterns," the requirements are stricter. You need an identity not tied to a phone number, IP protection, and a provider operating under legal constraints that limit what they can be compelled to disclose.&lt;/p&gt;

&lt;p&gt;If your threat model is "I need to be effectively anonymous," no consumer messaging app currently solves that — and most make it harder by requiring phone numbers.&lt;/p&gt;




&lt;p&gt;Encryption is a necessary component of a private communication system. It is not sufficient. Understanding what metadata reveals — and what your tools actually protect against — is the difference between privacy and the &lt;em&gt;feeling&lt;/em&gt; of privacy.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on the &lt;a href="https://havenmessenger.com/blog/posts/metadata-surveillance/" rel="noopener noreferrer"&gt;Haven Blog&lt;/a&gt;. Haven is an end-to-end encrypted email and chat app that uses email-based identity — no phone number required.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>security</category>
      <category>encryption</category>
      <category>infosec</category>
    </item>
    <item>
      <title>WhatsApp Alternatives in 2026: The Apps That Actually Respect Your Privacy</title>
      <dc:creator>Haven Messenger</dc:creator>
      <pubDate>Wed, 22 Apr 2026 01:53:20 +0000</pubDate>
      <link>https://forem.com/havenmessenger/whatsapp-alternatives-in-2026-the-apps-that-actually-respect-your-privacy-45n9</link>
      <guid>https://forem.com/havenmessenger/whatsapp-alternatives-in-2026-the-apps-that-actually-respect-your-privacy-45n9</guid>
      <description>&lt;p&gt;WhatsApp's end-to-end encryption is genuine — the Signal Protocol implementation is well-audited. The problem is everything around the encryption: who you talk to, how often, from which device, and what that data means to Meta's advertising business.&lt;/p&gt;

&lt;p&gt;Two billion people use WhatsApp. That makes it the default option for most of the world outside the US and China — and the reason most people stay isn't comfort with Meta's privacy practices, it's that leaving means losing access to most of their contacts.&lt;/p&gt;

&lt;p&gt;This is a real problem worth naming honestly: the best private messenger in the world is useless if no one you know uses it. Any realistic evaluation of WhatsApp alternatives has to grapple with the network effect problem, not just the technical properties of the encryption.&lt;/p&gt;

&lt;h2&gt;
  
  
  What WhatsApp Actually Collects
&lt;/h2&gt;

&lt;p&gt;First, the correct framing. WhatsApp's message content is end-to-end encrypted using the Signal Protocol. Meta cannot read your messages. When someone claims otherwise, they're wrong.&lt;/p&gt;

&lt;p&gt;What Meta &lt;em&gt;can&lt;/em&gt; collect, and does collect, is metadata:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Who you communicate with, and how frequently&lt;/li&gt;
&lt;li&gt;When you're active (last seen, online status)&lt;/li&gt;
&lt;li&gt;Your device identifiers, IP address, and location data (coarse)&lt;/li&gt;
&lt;li&gt;Your phone number and contact list (uploaded on first run)&lt;/li&gt;
&lt;li&gt;Usage patterns: how often you open the app, for how long&lt;/li&gt;
&lt;li&gt;Group memberships — who you're in a group with reveals your social graph&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The 2021 privacy policy update that triggered mass migration to Signal and Telegram was primarily about business accounts and integrating WhatsApp data more tightly into Meta's advertising infrastructure. The metadata collection described above existed before that update and continues.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;The metadata distinction:&lt;/strong&gt; Intelligence agencies have historically argued that "metadata is more valuable than content." Knowing that you called a particular lawyer, a particular oncologist, and a particular journalist on the same day tells a story that the content of those calls might not. Metadata is not a minor privacy footnote.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  The Alternatives, Honestly Evaluated
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Signal
&lt;/h3&gt;

&lt;p&gt;Signal is the most technically defensible private messenger available. The Signal Protocol is the gold standard for 1:1 and group message encryption. Sealed Sender hides who is messaging whom even from Signal's servers. The organization is a nonprofit; there's no advertising business model to monetize your data.&lt;/p&gt;

&lt;p&gt;The limitation is identity: Signal requires a phone number. Your Signal identity is permanently linked to a phone number, which is linked to your carrier, which is linked to your real name in most jurisdictions. Signal has introduced usernames as a way to avoid sharing your number with contacts, but registration still requires a phone number at the SIM level.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Personal use where you're replacing SMS/iMessage. Migration is easier than any other alternative — the UX is closest to WhatsApp.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Limitation:&lt;/strong&gt; Phone number identity requirement. Adoption is lower than WhatsApp in most non-US markets.&lt;/p&gt;

&lt;h3&gt;
  
  
  Telegram
&lt;/h3&gt;

&lt;p&gt;Telegram is frequently cited alongside Signal as a "private" messenger, which creates significant confusion. They are not equivalent.&lt;/p&gt;

&lt;p&gt;Telegram's default chats — including all group chats — are &lt;strong&gt;not end-to-end encrypted&lt;/strong&gt;. They are encrypted in transit (client to server and server to client), but Telegram holds the keys and can read the content. Only "Secret Chats" are end-to-end encrypted, and Secret Chats are not available in group settings.&lt;/p&gt;

&lt;p&gt;Telegram's founder Pavel Durov was arrested in France in August 2024 and faced charges related to content hosted on the platform, which led to a significant shift in the company's content moderation policies.&lt;/p&gt;

&lt;p&gt;If your reason for leaving WhatsApp is privacy, Telegram is not the answer for sensitive communications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Large communities, public channels, file sharing. Not for private communications.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Limitation:&lt;/strong&gt; Default chats are not end-to-end encrypted. Treat it like a semi-public forum.&lt;/p&gt;

&lt;h3&gt;
  
  
  iMessage (for Apple users)
&lt;/h3&gt;

&lt;p&gt;iMessage provides end-to-end encryption between Apple devices. The main caveat: iCloud Backup can undermine iMessage encryption if enabled, because backup keys are held by Apple and accessible to law enforcement. Apple's "Advanced Data Protection" (opt-in) encrypts backups end-to-end, but requires deliberate configuration and is not on by default.&lt;/p&gt;

&lt;p&gt;iMessage is also Apple-only. SMS fallback (green bubbles) is unencrypted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; All-Apple households or teams.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Limitation:&lt;/strong&gt; Apple-only. iCloud Backup disabled or Advanced Data Protection required for full encryption benefit.&lt;/p&gt;

&lt;h3&gt;
  
  
  Matrix / Element
&lt;/h3&gt;

&lt;p&gt;Matrix is a federated, open-source messaging protocol. Unlike Signal or WhatsApp, there's no single company running the servers — you can host your own Matrix server or use a public homeserver. End-to-end encryption is available (MLS support in development).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Technical teams, organizations that want to self-host, developers.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Limitation:&lt;/strong&gt; UX complexity. Non-technical users will struggle.&lt;/p&gt;

&lt;h3&gt;
  
  
  Haven
&lt;/h3&gt;

&lt;p&gt;Haven uses email as its identity layer — no phone number required. Real-time chat uses the MLS protocol (RFC 9420) — the same standard that major messaging platforms are converging toward for group encryption. Messages are end-to-end encrypted; Haven cannot read them.&lt;/p&gt;

&lt;p&gt;The identity model has a meaningful privacy advantage over Signal: no phone number means no link to your carrier, no SIM, and no phone registration paper trail. You sign up with an email address and a passphrase.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Users who want email and chat under one identity, without a phone number requirement.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Limitation:&lt;/strong&gt; Smaller network than Signal or WhatsApp.&lt;/p&gt;

&lt;h2&gt;
  
  
  Side-by-Side Comparison
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;App&lt;/th&gt;
&lt;th&gt;E2E Encrypted&lt;/th&gt;
&lt;th&gt;Phone Number Required&lt;/th&gt;
&lt;th&gt;Metadata Collection&lt;/th&gt;
&lt;th&gt;Open Source&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;WhatsApp&lt;/td&gt;
&lt;td&gt;Yes (content)&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Extensive&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Signal&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Minimal&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Telegram&lt;/td&gt;
&lt;td&gt;Secret Chats only&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Moderate&lt;/td&gt;
&lt;td&gt;Clients only&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;iMessage&lt;/td&gt;
&lt;td&gt;Yes (Apple↔Apple)&lt;/td&gt;
&lt;td&gt;Yes (Apple ID)&lt;/td&gt;
&lt;td&gt;Moderate&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Matrix&lt;/td&gt;
&lt;td&gt;Yes (opt-in)&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;Minimal (self-host)&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Haven&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;Minimal&lt;/td&gt;
&lt;td&gt;Partial&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  The Network Effect Problem
&lt;/h2&gt;

&lt;p&gt;The biggest factor in this decision isn't the comparison table above — it's who you need to reach. A few strategies that work:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Lead with a specific group.&lt;/strong&gt; Instead of asking everyone to switch, start with the people you communicate with most. One group on Signal is more valuable than a vague intention to move eventually.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Don't delete WhatsApp.&lt;/strong&gt; Keeping WhatsApp for contacts who won't switch doesn't undermine your privacy for the contacts who do. Compartmentalization is valid.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Point to specific incidents.&lt;/strong&gt; The 2021 policy change and documented metadata sharing cases are concrete. Specific incidents sometimes move people; abstract privacy arguments rarely do.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What We'd Recommend
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;For most people: Signal.&lt;/strong&gt; It has the best combination of strong encryption, usability, and adoption in privacy-conscious circles. The phone number requirement is a real limitation, but it's not a dealbreaker for most threat models.&lt;/p&gt;

&lt;p&gt;If you specifically want email-based identity and don't want to link your messaging to a phone number, &lt;strong&gt;Haven&lt;/strong&gt; solves that problem — and the unified email-and-chat model reduces the app fragmentation that makes "private communication" operationally exhausting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Avoid Telegram as a private messenger.&lt;/strong&gt; It's a good platform for communities and channels, but its default encryption model is not appropriate for sensitive communications — and conflating it with Signal has led to real privacy failures.&lt;/p&gt;

&lt;p&gt;Whatever you choose: the fact that you're evaluating your options means you're already ahead of the vast majority of people still sending unencrypted SMS and letting Google read their email. Perfect is the enemy of good.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This post was originally published on the &lt;a href="https://havenmessenger.com/blog/posts/whatsapp-alternative/" rel="noopener noreferrer"&gt;Haven Blog&lt;/a&gt;. Haven is an end-to-end encrypted messenger that uses email as your identity — no phone number required.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>security</category>
      <category>messaging</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
