Menu
Meta Engineering·May 1, 2026

Meta's End-to-End Encrypted Backup Key Vault Architecture

Meta details the architecture of its HSM-based Backup Key Vault, a geographically distributed system ensuring secure end-to-end encrypted backups for WhatsApp and Messenger. The system leverages Hardware Security Modules (HSMs) for tamper-resistant storage of recovery codes and employs majority-consensus replication for resilience across multiple datacenters. Recent updates include over-the-air fleet key distribution for Messenger and a commitment to publishing evidence of secure fleet deployments for enhanced transparency and verifiable security.

Read original on Meta Engineering

The article discusses the underlying architecture for Meta's End-to-End Encrypted Backup Key Vault, a critical component for securing user data in WhatsApp and Messenger. This system is designed to provide robust security guarantees, ensuring that neither Meta, nor cloud providers, nor any third party can access backed-up message history.

HSM-Based Backup Key Vault Foundation

The core of the system is built on Hardware Security Modules (HSMs), which are cryptographic processors designed to protect cryptographic keys and perform cryptographic operations within a tamper-resistant physical device. In this architecture, HSMs are used to store recovery codes, making them inaccessible to Meta and other parties. This design choice is fundamental for achieving true end-to-end encryption for backups, as it prevents even the service provider from decrypting user data.

  • Geographically Distributed Fleet: The vault is deployed across multiple datacenters, providing high availability and disaster recovery capabilities.
  • Majority-Consensus Replication: This mechanism ensures resilience. Data is replicated across multiple HSMs, and a majority consensus is required for operations, safeguarding against individual HSM failures or tampering attempts.
  • Immutable Logging: Cloudflare maintains an audit log of every validation bundle, adding an independent layer of verification and transparency.

Key Distribution and Transparency Enhancements

Meta has introduced enhancements to key distribution and transparency, particularly for Messenger. Unlike WhatsApp, which hardcodes fleet keys, Messenger requires a more dynamic approach to deploy new HSM fleets without mandating app updates.

ℹ️

Over-the-Air Fleet Key Distribution

For Messenger, fleet public keys are distributed dynamically as part of the HSM response. These keys are delivered in a validation bundle signed by Cloudflare and counter-signed by Meta, providing a strong cryptographic chain of trust and independent verification of authenticity. This allows for more agile deployment and updates of HSM fleets without client-side updates.

Furthermore, Meta is committed to publishing evidence of secure deployment for each new HSM fleet. This increased transparency allows users and auditors to verify that the system operates as designed and maintains its security guarantees, reinforcing trust in the end-to-end encryption model.

HSMEnd-to-End EncryptionKey ManagementDistributed SystemsData SecurityCloudflareMessagingReplication

Comments

Loading comments...