▶ Breaking
Meta is ending end-to-end encryption on Instagram DMs — May 8 2026. Here's what to use instead → // Discord leaked 70,000 government IDs. Why we built this → // OpenDescent v0.5.4 released — hubs, live streaming, signed file sharing. Download → // Normal life deserves privacy. // Meta is ending end-to-end encryption on Instagram DMs — May 8 2026. Here's what to use instead → // Discord leaked 70,000 government IDs. Why we built this → // OpenDescent v0.5.4 released — hubs, live streaming, signed file sharing. Download → // Normal life deserves privacy. //
Comparison  /  OpenDescent vs WhatsApp Published 2026-04-24

The WhatsApp alternative when you don't want to trust Meta.

WhatsApp is end-to-end encrypted by default — that part is genuinely real. The problem isn't the crypto; it's the custody. The same company ending Instagram's encryption on May 8, 2026, is the one telling you WhatsApp's is safe. After the January 2026 class action and the broader pattern of Meta rolling back privacy commitments, "trust Meta" is a policy choice, not an architectural one. OpenDescent is the architectural choice.

Not Meta · P2P
VS
Meta-owned · Central
E2E by defaultyes  ·  yes Phone requiredno  ·  YES Owned by Metano  ·  YES Peer-to-peerYES  ·  no Can be rolled backNO  ·  yes
Short version

Feature-by-feature. What "encrypted" actually means.

§ 01  /  Compared
Capability OpenDescent WhatsApp
Encryption
End-to-end encrypted by defaultYesYes
Can be removed via policy updateNo · architecturalYes · same as Instagram
Forward secrecyYes · per-message X25519Yes · Double Ratchet
Fully open sourceYes · MITClient yes · server no
Independently verifiable implementationYes · you run itNo · servers closed
Trust model
Requires trusting a companyNo companyYes · Meta
Owned by MetaNoYes
Subject to Meta privacy policy changesNoYes
Same parent as Instagram (encryption ended)NoYes
Active litigation over access claimsNoneClass action · Jan 2026
Identity
Phone number requiredNeverYes · required
Phone number visible to other usersN/A · no phoneYes · in chats
Phone number linked to Meta ads graphNoYes
Account recovery12-word mnemonicPhone + backup
Metadata
Who you talk to visible to companyNo companyYes
When you're onlineNot collectedCollected
Combined with Facebook/Instagram dataN/AYes · ad targeting
Device/IP loggingP2P onlyServer-side
Features
1-on-1 messagingYesYes
Group chatsYesYes · up to 1,024
Voice & video callsYesYes
Community hubs (Discord-style)YesNo
Live streamingYes · mesh-pullNo
Disappearing messagesRoadmapYes
Cross-platform mobileRoadmap (PWA)Yes
Platform
WindowsYesYes
macOS / LinuxSoonYes
iOS / AndroidRoadmapYes
PriceFree · Pro £5/moFree

The Meta problem. Same playbook, different app.

§ 02  /  Ownership

WhatsApp's encryption is not the problem. The problem is that WhatsApp is a product of the same company, run under the same privacy policy, subject to the same boardroom decisions, as the one that's removing end-to-end encryption from Instagram on May 8, 2026.

Instagram DMs
Same company
E2E gone · May 8 2026
WhatsApp
Same company
E2E on · today
Facebook Messenger
Same company
E2E opt-in · '23

The same board. The same privacy policy surface. The same commercial logic — advertising revenue goes up when content is scannable. Nothing architectural protects WhatsApp the way nothing architectural protected Instagram.

Why "just use WhatsApp" isn't a complete answer

Meta's own public reason for killing Instagram encryption — "very few people were opting in" — is a consumer-behaviour argument. WhatsApp is E2E by default, so the same argument doesn't apply today. But three things make the long-term bet on WhatsApp worse than it looks:

  • Policy changes are cheap. The Instagram change didn't require new code. It required updating a toggle and communications. The same is true for WhatsApp.
  • Metadata is already fair game. Meta doesn't need to read WhatsApp messages to know who you message, when, how often, from what device. That data already feeds the Facebook-Instagram-WhatsApp advertising graph.
  • You still gave them your phone number. WhatsApp requires a phone number to sign up — the single most durable identifier tied to your legal identity. Even if you stop using WhatsApp, Meta still has the link.
▶ The structural point
If a privacy guarantee can be rolled back with a privacy-policy email, it's not a guarantee — it's a courtesy. Courtesies get withdrawn. Architecture doesn't.

The lawsuit, what's actually alleged.

§ 03  /  Jan 2026

In January 2026, an international class action was filed against Meta and WhatsApp. We're being careful here: the allegations are unresolved, Meta denies them, and nothing on this page is a legal determination. What's public and reportable is the substance of the filing and the regulatory response.

September 2025
Former WhatsApp head of security sues Meta
Attaullah Baig, former WhatsApp head of security, alleges in a filing that approximately 1,500 engineers had unrestricted access to user metadata — contacts, IP addresses, profile photos. The filing concerns metadata, not message content.
January 2026
International class action expands the claims
An international class action filed against Meta alleges the company misled over 3 billion users about WhatsApp's encryption guarantees, and that the access alleged in the Baig filing extends to message content. Meta has publicly called the claims "false and absurd". Case summary.
February 2026
US authorities investigate
Bloomberg reports that US authorities are investigating Meta based on the allegations. Cryptographer Matthew Green publishes a detailed analysis — concluding broadly that the cryptographic properties claimed for WhatsApp remain plausible, but that client-side risks (what happens on your phone, what the app itself can see before encryption) are a legitimate concern, independent of the server-side allegations.
Ongoing
Meta denies · public debate continues
Meta maintains that WhatsApp uses end-to-end encryption via the Signal Protocol and that Meta cannot decrypt messages. Elon Musk reacted publicly on X: "Can't trust WhatsApp." Pavel Durov (Telegram) weighed in with criticism of both sides. The cryptographic community remains divided on how much weight to give the specific technical claims.

Our position: we don't need you to believe the lawsuit to make our case. We just need you to notice that the question "can Meta access my WhatsApp messages?" is a question whose answer depends on Meta's current intentions and current configuration. Both of those can change. Ours cannot — because there is no "us" to change its mind.

Questions, straight answers.

§ 04  /  FAQ
Is WhatsApp really end-to-end encrypted?01
Officially and technically, yes. WhatsApp uses end-to-end encryption by default, based on the Signal Protocol. The January 2026 class action disputes this — unresolved, Meta denies, US authorities investigating. For most threat models, WhatsApp messages are encrypted in a way Meta cannot trivially decrypt. The question is whether that holds indefinitely and whether it holds against all adversaries.
Can Meta read my WhatsApp messages?02
Meta's official position is no — messages are end-to-end encrypted and Meta cannot decrypt them. Meta does see metadata: who you talk to, when, from which device. The January 2026 class action alleges Meta can in fact access message content via engineer-level access; Meta denies this. Even if the lawsuit's specific technical claims don't hold, the structural point stands: WhatsApp's encryption is a policy commitment, not an architectural impossibility.
Why leave WhatsApp if it's still encrypted?03
Three reasons. (1) The same company is rolling back Instagram's encryption on May 8, 2026 — nothing architectural prevents the same happening to WhatsApp. (2) Meta combines WhatsApp metadata with Facebook and Instagram data for ad targeting, without needing to read content. (3) WhatsApp requires your phone number, giving Meta a permanent identifier tied to your legal identity.
Is OpenDescent's encryption as good as WhatsApp's Signal Protocol?04
Different implementation, comparable security properties for our threat model. WhatsApp uses the Signal Protocol's Double Ratchet for forward secrecy; OpenDescent uses ephemeral X25519 key agreement per message. Both achieve forward secrecy. WhatsApp's implementation has a longer audit history. OpenDescent's is open source and uses standard primitives, but hasn't been through a formal professional audit yet.
What if my family is on WhatsApp and won't switch?05
Most migrations aren't flag-day. Pick the three-to-five people who will move and start there. Keep WhatsApp for your family group chat if you need to — but move the conversations where privacy actually matters to you. You don't have to delete WhatsApp to use OpenDescent.
Does OpenDescent sell data to advertisers?06
No. OpenDescent has no ads, no advertising partners, and no way to target ads even if we wanted to — there is no central server to aggregate data from. The project funds itself through an optional Pro subscription (£5/mo) for larger file transfers and more hubs. Every core feature is free.
Is OpenDescent free?07
Yes, free and open source under the MIT license. Pro is optional and funds the project.
Why does WhatsApp require a phone number?08
WhatsApp has historically used phone numbers as the primary identifier for accounts — they're convenient for discovering contacts you already have, and they make spam harder at scale. They also tie your WhatsApp usage to a government-issued identifier associated with your legal identity, visible to other users in chats by default, and linked to Meta's broader advertising graph. OpenDescent uses cryptographic keys instead.
The bottom line

Put your private conversations somewhere Meta can't change its mind.

Free. Open source. No Meta. No phone number. No account. Nothing in the middle to scan, to sell, or to hand over — and no company that can decide otherwise next year.