Meta details the architecture of its HSM-based Backup Key Vault, a geographically distributed system ensuring secure end-to-end encrypted backups for WhatsApp and Messenger. The system leverages Hardware Security Modules (HSMs) for tamper-resistant storage of recovery codes and employs majority-consensus replication for resilience across multiple datacenters. Recent updates include over-the-air fleet key distribution for Messenger and a commitment to publishing evidence of secure fleet deployments for enhanced transparency and verifiable security.
Read original on Meta EngineeringThe article discusses the underlying architecture for Meta's End-to-End Encrypted Backup Key Vault, a critical component for securing user data in WhatsApp and Messenger. This system is designed to provide robust security guarantees, ensuring that neither Meta, nor cloud providers, nor any third party can access backed-up message history.
The core of the system is built on Hardware Security Modules (HSMs), which are cryptographic processors designed to protect cryptographic keys and perform cryptographic operations within a tamper-resistant physical device. In this architecture, HSMs are used to store recovery codes, making them inaccessible to Meta and other parties. This design choice is fundamental for achieving true end-to-end encryption for backups, as it prevents even the service provider from decrypting user data.
Meta has introduced enhancements to key distribution and transparency, particularly for Messenger. Unlike WhatsApp, which hardcodes fleet keys, Messenger requires a more dynamic approach to deploy new HSM fleets without mandating app updates.
Over-the-Air Fleet Key Distribution
For Messenger, fleet public keys are distributed dynamically as part of the HSM response. These keys are delivered in a validation bundle signed by Cloudflare and counter-signed by Meta, providing a strong cryptographic chain of trust and independent verification of authenticity. This allows for more agile deployment and updates of HSM fleets without client-side updates.
Furthermore, Meta is committed to publishing evidence of secure deployment for each new HSM fleet. This increased transparency allows users and auditors to verify that the system operates as designed and maintains its security guarantees, reinforcing trust in the end-to-end encryption model.