ABCDEFGHIJKLMNOPQRSTUVWXYZAAABAC
1
Popular messengers compared for security and confidentialitySignalWire 4Skred
(by TwinMe)
ThreemaSessionTelegram
SnapChat
(see SnapLion)
WhatsappFacebook MessengerSkypeGoogle MessagesElement / RiotApple iMessage
3
Recommended for securing messages and attachments?YesYesYesYesNo via server in
Canada!
NoNoNoNoNoNoNoNo
4
Is encryption turned on by default?YesYesYesYesYesNoNo. if on, AI sends info homeYes
(Not in browser)
No / not available with web client(s)NoYesNoYes
5
Does the app have self-destructing messages?YesYesSkred: Yes
TwinMe: paid feature
NoYesYes
s/1m/1h/1d/1w/off
Read by ai and Snap retains copiesyes but may get copiesNoNoNoNoNo
6
Can you recall messages?
(remote-delete)
YesYesYes, plus nuke conversationYesUnreliable / Buggyonly for
24hrs
Yes but Snap keeps copies1 day time limit to recallLimited, FB keeps copiesNoNoYesNo
7
Does it have PFS? (Perfect-Forward-Secrecy)YesYesYesNot enabled by default.Cancelled!NoNoNoNoNoNoNoNo
8
Are there secured group/chatrooms?Yes
1000 members
Yes
500 members
Yes
unlimited /
not known
Yes
256 members
Yes
100 members
NoNoYes but reports unencryptedYes. Web:no. fb retains copiesNoYes? but limits. logs metadataworkaround existsNo
9
Can you sign up to the app anonymously?Phone # is your ID!Number or email requiredYes. + change QR/codePmt proc. has your infoYesNoNoNoNoNoNoServer ops can ID youNo
10
Is personal information (mobile number, contact list, etc.) hashed?Mostly except mobile #, undisclosed metadataMostly, except contacts + groupsNot storing your infoYes
but questions about payment processor
Yes
but questions about files & calls server
NoNoNoNoNoNoYour IP/ identity can be known by server operatorsNo
11
Generate & keep private key on device?YesYesYesYesYesYesNoYesYesYesYesYes
12
Can messages be read by the company?NoNoNoNoNoYesYes and AI to assist if reportedYesYesYes they can visit groupsNo / depends
13
Does the app enforce perfect forward secrecy?YesYesYesNo. must be
set manually
Noonly every 100 usesNoYesNoNoYesYesNo
14
info or metadata collected or sent to 3rd parties?Undisclosed "minimal metadata"Limited metadata
(Not shared)
NoKnown by payment processorIf you paid for alias or nodesYesAll user data, incl. messages + contentYesAll user data, incl. messages + contentAll user data, incl. messages + contentAll user data, incl. messages + contentKnown by payment processorAll user data, incl. messages + content
15
Does the app encrypt metadata?YesYes. but Not contacts+groupsNo server, no metadataYesYesNoNoNoNoNoNoYes but servers can see your IPNo
16
Does the company log timestamps/IP addresses?Yes: who you're talking withYes: who you're talking withNoNoNoYesYesYesYesYesYesServer operators canYes
17
Does the app use TLS/Noise to encrypt network traffic?YesYesYesYesYesNoNoYesYesYesYesYesYes
18
Does the app encrypt data on the device? (iOS / Android)Yes if key & passphrase setYesYesYes if key & passphrase setAndroid: Yes
IOS: No
NoNoNoNoNoNoYesYes if key & passphrase set
19
2-factor authentication?YesYesNoYesYesYesNoYesNoNoNoNoNo
20
Are messages encrypted when backed up to the cloud?N/A, excluded from iCloud iTunes Android backupsexcluded from auto backups. Optionally use Wire's servers.N/AYesN/A, excluded from iCloud iTunes Android backupsNoNo, and analyzed by AINoNoNoNoYesNo
21
Are the app and server completely open source?YesYesNo, the encryption libraries areYesYesNo (clients and API only)NoNoNoNoNoMost clients, Element server/API matrix.orgNo
22
Have there been a recent code audit and an independent security analysis?NO. only old version 2014NO. only old version 2018encryption librariesNO. only old version 2020encryption only
with some fails
Client only
(Nov., 2015)
NoNoNoNoNoNo only encryptionNo
23
Company jurisdictionUSASwitzerlandSkred; France
TwinMe: USA
SwitzerlandAustraliaBritish Virgin IslandsUSAUSAUSAUSAUSAUKUSA
24
Infrastructure location
(sometimes also jurisdiction depending on laws)
Influences connection quality.
USAGermany
best speed
Decentralized peer-to-peerSwitzerlandText peer-to-peer,
Attachments & calls: servers in Canada
Dubai UAE, UK, Singapore, USA, FinlandUSAUSA, SwedenUSA, SwedenUSA, Australia, Netherlands, Brazil, China, Ireland, Hong Kong, JapanWorldwide (Google Cloud regions)UK/ potentially all jurisdictions, given it's decentralisedUSA; runs on AWS and Google Cloud
25
Giving customers data to intelligence agencies?NoNoNoNoNoNo (?)YesYesYesYesYesNo but not foolproofYes
26
Surveillance capability built into the app?NoNoNoNoNoNot for secret chatsYesNoYesYesNoNoNo
27
Does the company provide a transparency report?YesYesYesYesYesNoYesYesYesYesYesNoYes
28
Company's general stance on customers' privacyGoodGoodGoodGoodGoodPoorPoorPoorPoorPoorPoorConfusingPoor
29
App/company collects customers' data?Contacts.
Phone number hard-coded to account.
Who is talking with whom and "other" information.
Unknown other data being read/saved with their newly added closed code to "fight spam".
Wire Personal:
Ltd metadata; IP, email or number (if provided), friends, groups

Wire Enterprise:
Contact info / metadata
No / certain metadata is used but not kept, such as device type, os, to set things like window dimensions, location (if shared) for language, and IP to perform contacts connectionLimited: Contact info (if provided), identifiers

Contact/Billing information known by their payment processor.
No

forensic audit would be needed to determine whether their crypto transactions are traceable (the only way to purchase your alias)
Yes

Contact info /
contacts /
identifiers / MetaData / Chats / Groups activity / Content
(only 1:1 "secret chats" do not have chats shared)
Yes
AI data collection & analysis on steroids. Collects everything on phone.
Filters can share face pictures to facial recognition databases and systems
Yes

Purchases /
financial info /
location /
contact info /
contacts /
user content /
identifiers /
usage data /
diagnostics

May be able to circumvent e2ee
Health & fitness / purchases / financial info / location / contact info / contacts / user content / search + browsing history / identifiers / usage data / sensitive info / diagnostics / other dataYes

(Information not submitted to Apple Store)
Yes

(Difficult to assess given the app is integrated into Google's greater ecosystem)
Yes

Contact info (if provided) /
contacts /
identifiers /
diagnostics /
user content /
metadata
Yes

(Difficult to assess given the app is integrated into Apple's greater ecosystem)
30
Cryptographic primitivesCurve25519 / AES-256 / HMAC-SHA256Curve25519 / ChaCha20 / HMAC-SHA256WebRTC/TLS / EDCH / AES-256 / SQLCipherCurve25519 256 / XSalsa20 256 / Poly1305-AES 128X25519 / XSalsa20 256 / Poly1305RSA 2048 / AES 256 / SHA-256AI on local device defeats the purpose of any encryptionCurve25519 / AES-256 / HMAC-SHA256Curve25519 / AES-256 / HMAC-SHA256RSA-1536 & 2048 / AES 256 / SHA-1Curve25519 / AES-256 / HMAC-SHA256Curve25519 / AES-256 / HMAC-SHA256RSA-1280 (encryption), ECDSA 256 (signing) / AES 128 / SHA-1
31
Funding
Sources
Freedom of the Press, Knight, Shuttleworth, Signal, Open T.Janus Friis / Zeta Holdings / Iconical /
Morpheus
Skyrock GroupUser pays / Afinum Mgt AG
LAG Foundation LtdPavel DurovSnap / Alto Partners Multi-Family OfficeMetaMetaMicrosoftGoogleNew Vector LimitedApple
32

Main reasons why the app isn't recommended

- or -

Desirable improvements for recommended apps

Uses your number as user ID (personal identifying data should be confidential)

Last audit obsolete (8 years ago!)

New code to control spam (how?).

Caution about number- spoofing vulnerability.
Ver.4 new product not yet peer reviewed.

Seems unfinished.

No dark mode!

Could further limit metadata.

Enterprise collects more MetaData, has "legal-hold" feature.
Video sharing and large file transfers is a paid feature.

TwinMe's expiring messages is a paid feature.
Paid app = very small userbase.

Most of your friends won't like you asking them to pay just to talk with you.

Should change their financing model. Like Wire maybe with a paid enterprise version.
Some things in whitepaper not implemented, such as PFS and mesage recall.

Long complicated code in place of a username, crypto cost for username, learning-curve to use their crypto.
Chats/activity kept forever on their servers.

Chatrooms / groups not encrypted.

Messages not encrypted except for 1:1 secret chats.

Attachments not encrypted.

Most data not protected.
Lack of privacy / encryption.
AI is super-charged data collection and analysis.
Servers retain copy of "disappeared" messages for AI analysis.
Filters can share images to facial recognition databases.
SnapLion tool
NSA partner

May be able to circumvent e2ee by using app to read unencrypted stored chats. Reported chats are sent unencrypted.

Make money from collecting, renting, selling personal data.

No code audits, closed source.
Named as NSA partner in Snowden revelations

Encryption off by default. Not available if a browser login is in conversation

Revenue from sharing data

Data not protected

Perpetually new bugs, closed source, no code audits
NSA partner

Encryption not enabled by default

Makes money from personal data

Data not protected, not all data protected


Closed source
NSA partner

With dilution (distraction, confusion) of no less than 6 messaging programs, it's a roll of the dice as to which will survive the next round of terminated google apps.

Website offers no information about features.

Enormous potential attack surface. "encrypted messages can be leaked through unsecured connected clients.

No independent code or security review
NSA partner

Data not protected, not all data protected

No independent & recent code audit and security analysis


Closed source
33
34
Legend (color guide) : Deep Red = Major ConcernBright Green = Very DesirableAmber = Somewhat concerningN/A = not applicable or not available in time to publish
35
36
Notes
Inspired by https://www.securemessagingapps.com/ and intended to be a more complete version with some updates and corrections. Please rely on your own research.
Share link https://docs.google.com/spreadsheets/d/14r1sLT0SSU2kKFlsi7BWGj65zPdcC4x-LfjAoKUQxNA
https://app.element.io/