Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
The Hacker NewsArchived Mar 16, 2026✓ Full text saved
Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026. "If you have chats that are impacted by this change, you will see instructions on how you can download any media or messages you may want to keep," the social media giant said in a help document. "If you're on an older version of Instagram, you may also need to update the
Full text archived locally
✦ AI Summary· Claude Sonnet
Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
Ravie LakshmananMar 13, 2026Encryption / Data Protection
Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026.
"If you have chats that are impacted by this change, you will see instructions on how you can download any media or messages you may want to keep," the social media giant said in a help document. "If you're on an older version of Instagram, you may also need to update the app before you can download your affected chats."
When reached for comment, this is what Meta had to say: "Very few people were opting in to end-to-end encrypted messaging in DMs, so we're removing this option from Instagram in the coming months. Anyone who wants to keep messaging with end-to-end encryption can easily do that on WhatsApp."
The American company first began testing E2EE for Instagram direct messages in 2021 as part of CEO Mark Zuckerberg's "privacy-focused vision for social networking." The feature is currently "only available in some areas" and is not enabled by default.
Weeks into the Russo-Ukrainian war in February 2022, the company made encrypted direct messaging available to all adult users in both countries.
The development comes days after TikTok said it does not plan to introduce E2EE to secure direct messages on the platform, telling BBC News that the technology makes users less safe and that it wants to protect users, especially young people, from harm.
Late last month, Reuters also reported that Meta proceeded with plans to adopt encryption to secure messages in Facebook and Instagram despite internal warnings in 2019 that doing so would hinder the company's ability to detect illegal activities, such as child sexual abuse material (CSAM) or terrorist propaganda, and flag them to law enforcement.
E2EE has been hailed as a win for privacy, as it ensures that only communicating users can decrypt and read messages, thereby locking out service providers, bad actors, and other third parties from accessing or intercepting the data.
However, law enforcement and child safety advocates have argued that the technology creates a safe space for criminals, as it prevents companies from complying with warrants to turn over message content – a problem referred to as the "Going Dark" phenomenon.
This year, the European Commission is expected to present a Technology Roadmap on encryption to identify and evaluate solutions that enable lawful access to encrypted data by law enforcement, while safeguarding cybersecurity and fundamental rights.
(The story was updated after publication to include a response from Meta.)
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
cybersecurity, data protection, encryption, Instagram, law enforcement, Messaging Security, Meta, Privacy, Social media
Trending News
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack and Vibe-Coded Malware
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine and More
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Popular Resources
Read CYBER360 2026: From Zero Trust Limits to Data-Centric Security Paths
Self-Hosted WAF: Block SQLi, XSS, and Bots Before They Reach Your Apps
Identity Controls Checklist: Find Missing Protections in Apps
19,053 Confirmed Breaches in 2025 – Key Trends and Predictions for 2026