WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

Avatar
Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner. “Private Processing will allow users to leverage powerful optional AI features – like summarizing unread messages or editing help – while preserving WhatsApp’s core privacy promise,” the Meta-owned service said in a
[[{“value”:”

Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner.

“Private Processing will allow users to leverage powerful optional AI features – like summarizing unread messages or editing help – while preserving WhatsApp’s core privacy promise,” the Meta-owned service said in a statement shared with The Hacker News.

With the introduction of the latest feature, the idea is to facilitate the use of AI features while still keeping users’ messages private. It’s expected to be made available in the coming weeks.

The capability, in a nutshell, allows users to initiate a request to process messages using AI within a secure environment called the confidential virtual machine (CVM) such that no other party, including Meta and WhatsApp, can access them.

Confidential processing is one of the three tenets that underpin the feature, the others being –

Enforceable guarantees, which cause the system to fail or become publicly discoverable when attempts to modify confidential processing guarantees are detected
Verifiable transparency, which allows users and independent researchers to audit the behavior of the system
Non-targetability, which prevents a particular user from being targeted without breaching the whole security architecture
Stateless processing and forward security, which ensures that messages are not retained once the messages are processed so that an attacker cannot recover historical requests or responses

The system is designed as follows: Private Processing obtains anonymous credentials to verify that future requests are coming from a legitimate WhatsApp client and then proceeds to establish an Oblivious HTTP (OHTTP) connection between the user’s device and a Meta gateway via a third-party relay that also hides the source IP address from Meta and WhatsApp.

A secure application session is subsequently established between the user’s device and the Trusted Execution Environment (TEE), following which an encrypted request is made to the Private Processing system using an ephemeral key.

This also means that the request cannot be decrypted by anyone other than the TEE or the user’s device from which the request (e.g., message summarization) is sent.

The data is processed in CVM and the results are sent back to the user’s device in an encrypted format using a key that’s accessible only on the device and the Private Processing server.

Meta has also acknowledged the weak links in the system that could expose it to potential attacks via compromised insiders, supply chain risks, and malicious end users, but emphasised it has adopted a defense-in-depth approach to minimize the attack surface.

Furthermore, the company has pledged to publish a third-party log of CVM binary digests and CVM binary images to help external researchers “analyze, replicate, and report instances where they believe logs could leak user data.”

The development comes as Meta released a dedicated Meta AI app built with Llama 4 that comes with a “social” Discover feed to share and explore prompts and even remix them.

Private Processing, in some ways, mirrors Apple’s approach to confidential AI processing called Private Cloud Compute (PCC), which also routes PCC requests through an OHTTP relay and processes them in a sandboxed environment.

Late last year, the iPhone maker publicly made available its PCC Virtual Research Environment (VRE) to allow the research community to inspect and verify the privacy and security guarantees of the system.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

“}]] The Hacker News 

Total
0
Shares
Previous Post

New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems

Next Post

France blames Russian military intelligence for years of cyberattacks on local entities

Related Posts

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility

Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center. The two critical-rated vulnerabilities in question are listed below -  CVE-2024-20439 (CVSS score: 9.8) - The presence of an undocumented static user credential for an administrative account that an attacker could exploit to log in to an
Avatar
Read More

⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More

Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside everyday actions: opening a file, running a project, or logging in like normal. No loud alerts. No obvious red flags. Just quiet entry through small gaps — like a misconfigured pipeline, a trusted browser feature,
Avatar
Read More

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant authentication method by default. "Brand new Microsoft accounts will now be 'passwordless by default,'" Microsoft's Joy Chik and Vasu Jakkal said. "New users will have several passwordless options for
Avatar
Read More