FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

X launches E2EE chat, but you shouldn’t trust it yet

John Melendez
Last updated: September 5, 2025 10:57 pm
By John Melendez
SHARE

X, the platform formerly known as Twitter, is rolling out a feature it calls end-to-end encrypted chat, branded as Chat or XChat. On paper, it promises that only you and your recipient can read your messages. In practice, the design choices behind this launch leave large cracks in that promise — big enough that privacy experts say you should hold off using it for anything sensitive.

Table of Contents
  • How X’s setup undermines its own encryption
  • No verification, no trust: the AITM problem
  • Missing essentials: PFS, openness, and audits
  • What to use now — and what X must do

The company is pitching full end-to-end encryption, yet cryptographers examining what’s available today say the implementation falls short of industry norms set by mature systems like Signal. Several of the most concerning issues are acknowledged by X itself in its support materials.

X launches end-to-end encrypted chat amid security and trust concerns

How X’s setup undermines its own encryption

When you enable XChat, you’re asked to create a four-digit PIN. That PIN encrypts your private key — the secret that unlocks your messages — which X then stores on its servers. That design is the first problem. Best practice is to keep private keys exclusively on user devices, not in a company’s custody.

A four-digit PIN has only 10,000 combinations. Unless that key is locked inside hardware security modules (HSMs) with strict rate limits and wrapped by a strong key-derivation function such as Argon2 or scrypt, a determined insider could brute-force it. Security researcher Matthew Garrett flagged exactly this risk, noting that server-side key storage with low-entropy protection invites abuse if the infrastructure and controls aren’t rock solid.

HSMs exist to make tampering prohibitively difficult, even for the company that owns them. Without credible assurances — and independent verification — that HSMs and rigorous safeguards are in place, storing users’ decryption keys on the service remains a fundamental red flag.

No verification, no trust: the AITM problem

X also concedes that a malicious insider — or the service itself — could compromise conversations. That’s effectively an adversary-in-the-middle (AITM) risk: if the platform can swap in a different public key for your contact, it can silently intercept messages. Garrett points out that because X hands you your partner’s public key, you have no reliable way to prove X hasn’t invented a replacement.

Modern encrypted messengers mitigate this with user-verifiable safety numbers or QR codes, and increasingly with key-transparency systems. WhatsApp, which uses the Signal Protocol by default for more than two billion accounts, provides safety-code verification and has deployed a key-transparency service to detect server-side key swaps. Apple offers Contact Key Verification in iMessage for high-risk users. Without comparable verification, XChat asks users to trust what the server says — the opposite of what end-to-end encryption is designed to achieve.

X, formerly Twitter, launches end-to-end encrypted chat amid security concerns

Missing essentials: PFS, openness, and audits

X’s current implementation lacks perfect forward secrecy (PFS), a core property where every session — and often every message — gets a fresh ephemeral key. With PFS, even if one long-term key is compromised, an attacker can’t decrypt past conversations. Absent PFS, a single key exposure can unlock large swaths of history.

Openness is another gap. None of the protocol details or code are publicly available yet. Signal’s protocol is fully documented and open source, with years of scrutiny from academics and firms like NCC Group and Trail of Bits. Wire and Matrix (Olm/Megolm) publish specifications and commission audits. Apple, meanwhile, publicly documented its PQ3 upgrade to iMessage, moving to post-quantum-hardened key exchange. X says it plans to release a whitepaper and open-source its work, but trust in encryption is earned through third-party review, not promises.

Matthew Green, a cryptography professor at Johns Hopkins University, has also voiced concerns. His view aligns with a broad consensus in the field: until a design is transparent and independently verified, users should assume weaknesses exist.

What to use now — and what X must do

If your safety or livelihood depends on private messaging, use Signal. It’s open, audited, and incorporates state-of-the-art features like the Double Ratchet and a post-quantum hybrid handshake (PQXDH). WhatsApp’s default end-to-end encryption, built on the same core protocol, is also robust, with key verification options. iMessage adds meaningful protection when Contact Key Verification is enabled, especially for high-risk users.

For X to earn trust, it should publish a detailed threat model and protocol specification; open-source client and server components; add perfect forward secrecy and a clear verification UX (safety numbers/QR); deploy key transparency; secure keys in HSMs with verifiable controls; replace the four-digit PIN with a high-entropy passphrase protected by modern KDFs and strict rate limiting; and commission independent audits by recognized firms, alongside a meaningful vulnerability disclosure and bounty program. Until then, treat XChat as experimental, not a secure channel.

Latest Articles
Musk Denies White House AI Event Snub
Technology
Tesla Floats $1 Trillion Pay Plan for Elon Musk
Business
Final Call: Exhibit at Disrupt 2025
Business
Snapchat’s Imagine Lens turns text into AI images
Technology
Tesla investors to weigh stake in Musk’s xAI
Business
OpenAI Hires Team Behind Xcode Assistant Alex
Technology
Ex-Scale AI CTO launches agent to fix big data access
Technology
Natron’s collapse exposes a battery gap in the US
Business
Warner Bros. sues Midjourney over Superman, Batman AI
Technology
Roblox debuts gameplay clips feed and creator AI tools
Technology
Tesla’s ad spend on X nears zero
Business
US Semiconductor Market: A Yearlong Timeline
Business
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.