A Step-by-Step Guide to How Meta Secures Your Encrypted Backups

By

Introduction

End-to-end encrypted backups ensure that your private messages remain accessible only to you, even if cloud storage or Meta's servers are compromised. Meta has built a robust infrastructure for WhatsApp and Messenger based on the HSM-based Backup Key Vault. This guide walks you through the key steps Meta takes to protect your backup recovery codes and maintain transparency about the security of its hardware security module (HSM) fleets.

A Step-by-Step Guide to How Meta Secures Your Encrypted Backups
Source: engineering.fb.com

What You Need

Step-by-Step Process

Step 1: Deploy the HSM-based Backup Key Vault

Meta's foundation is a geographically distributed fleet of HSMs organized into a Backup Key Vault. This vault stores your recovery code (used to restore your message history) in a way that is inaccessible to Meta, cloud providers, or any third party.

Step 2: Enable Over-the-Air Fleet Key Distribution (for Messenger)

To verify that clients are communicating with a genuine HSM fleet, public keys must be authenticated. In WhatsApp these keys are hardcoded in the app, but Messenger requires a more flexible approach.

  1. Generate validation bundle: When a new HSM fleet is deployed, a fleet public key is bundled with a signature from Cloudflare (the independent auditor) and a counter-signature from Meta.
  2. Deliver bundle over the air: The validation bundle is sent to Messenger clients as part of the HSM response, eliminating the need for an app update.
  3. Client verification: The Messenger client verifies the bundle's signatures to confirm that the fleet key is genuine and has been audited.
  4. Audit log maintained: Cloudflare retains a cryptographic audit log of every validation bundle, providing independent proof of authenticity.

Step 3: Publish Evidence of Secure Fleet Deployment

Meta commits to transparency by publishing evidence for each new HSM fleet deployment on its engineering blog.

Step 4: Enable User Verification of Fleet Authenticity

As a user, you can confirm that your backup is protected by a legitimate HSM fleet. This step is crucial for those who want to audit Meta's system.

A Step-by-Step Guide to How Meta Secures Your Encrypted Backups
Source: engineering.fb.com
  1. Obtain the fleet public key: From the published evidence or directly from the client-server interaction.
  2. Check the validation bundle: Ensure the bundle is signed by Cloudflare and counter-signed by Meta.
  3. Compare with the audit log: Cloudflare's audit log records every bundle; you can request verification (details in the whitepaper).
  4. Validate the HSM attestation: Use the hardware attestation mechanisms built into the HSMs to confirm they are genuine devices.

Tips for Deeper Understanding

Tags:

Related Articles

Recommended

Discover More

Mother of Mila Launches New Biotech to Scale Bespoke Genetic Medicines After Previous Startup CollapsedHow Apple Seeks Supreme Court Intervention to Pause App Store Fee Ruling in Epic Games DisputeHuman Data Quality Called Critical for AI Model Training, Experts Warn of NeglectFrom Chaos to Clarity: How GitHub’s AI-Driven Approach Ensures Every Accessibility Voice Is HeardNew Linux RAT QLNX Targets Developer Credentials in Software Supply Chain Attacks