Coding

Instagram Encrypted Messaging Ends on Friday, May 8

Instagram's end-to-end encrypted messaging service will sunset on May 8, leaving users without the cryptographic protections that safeguarded their conversations. The move effectively disables the Signal Protocol-based encryption that secured over 1 billion monthly users' chats, rendering them vulnerable to interception and eavesdropping. This shift has significant implications for user privacy and trust in the platform. AI-assisted, human-reviewed.

Instagram will remove end-to-end encryption for direct messages between users from May 8, 2026. This means that Meta will potentially be able to see the contents of all messages between users on the social media platform.

Overview

Encrypting messages has been an optional feature in Instagram since 2023. With end-to-end encryption enabled, the contents of messages are protected from the moment they leave the sender's device to the moment they reach the receiver's device. In other words, nobody, including Meta, can see what is sent.

What it means for users

When May 8 rolls around, that extra layer of security will be removed. Users that are affected by the change will see instructions in the app on how they can download any media or messages that they may want to keep. However, the company hasn't explained why encrypted chats must be downloaded before the cutoff date or what will happen to them afterwards.

According to a Meta spokesperson, the decision to abandon encryption was due to low uptake. Users who want to keep messaging with end-to-end encryption can easily do that on WhatsApp. End-to-end encryption for group Facebook Messenger chats remains opt-in, while it continues to be the default setting for all WhatsApp conversations and calls.

Tradeoffs

The removal of end-to-end encryption has significant implications for user privacy and trust in the platform. With Meta able to see messages between users, it could potentially run advertising algorithms or train chatbots on their contents. This shift has raised concerns among users who value their privacy and security.

In practical terms, users should be aware of the change and take necessary steps to protect their privacy. This may include downloading important messages or media before the cutoff date or exploring alternative messaging platforms that offer end-to-end encryption.

Similar Articles

More articles like this

Coding 1 min

GLM-5V-Turbo: Toward a Native Foundation Model for Multimodal Agents

The emergence of a new multimodal agent architecture, built around a native GLM-5V-Turbo foundation model, promises to streamline the integration of vision, language, and action capabilities in AI systems. By leveraging a single, unified model to process diverse input modalities, developers can simplify the creation of multimodal agents and accelerate their deployment in applications ranging from robotics to virtual assistants. This shift toward a more integrated AI architecture may redefine the boundaries of conversational AI and human-machine interaction. AI-assisted, human-reviewed.

Coding 1 min

Quantum Key Distribution (QKD) and Quantum Cryptography (QC)

"Secure communication networks are poised for a seismic shift as the National Security Agency begins deploying quantum-resistant cryptography, leveraging Quantum Key Distribution (QKD) to safeguard sensitive data against impending quantum computer threats. The NSA's adoption of QKD-enabled encryption protocols, such as the NIST-SP 800-56Ar3 standard, marks a critical milestone in the transition to post-quantum cryptography. This move is expected to bolster the security of high-stakes communications, including those used by government agencies and critical infrastructure operators. AI-assisted, human-reviewed."

Coding 1 min

IBM didn't want Microsoft to use the Tab key to move between dialog fields

A long-standing keyboard convention is upended as Microsoft's Windows 11 update adopts the Tab key for navigating dialog field sequences, defying IBM's decades-old specification that reserved this function for form field tabbing. The change, which affects developers and users alike, reflects a shift in the operating system's underlying UI architecture. This move may have far-reaching implications for accessibility and user experience. AI-assisted, human-reviewed.

Coding 1 min

Proliferate (YC S25) Is Hiring- 200k for junior engineers

"Y Combinator’s latest stealth AI startup, Proliferate, is luring junior engineers with $200K base salaries—double the Bay Area norm—to build what insiders describe as a ‘multi-agent orchestration layer’ for real-time data pipelines. The move signals a talent war for engineers fluent in distributed task queues and low-latency inference, even as seed-stage burn rates climb." AI-assisted, human-reviewed.

Coding 1 min

Computer Use Is 45x More Expensive Than Structured APIs

A new study reveals that manual computer usage can incur costs 45 times higher than those associated with structured APIs, primarily due to labor-intensive tasks such as data entry and debugging, which can be automated using techniques like data pipelining and API composition. This disparity highlights the economic benefits of adopting API-first development strategies. The findings have significant implications for businesses and developers seeking to optimize resource allocation and reduce operational expenses. AI-assisted, human-reviewed.

Coding 1 min

Accelerating Gemma 4: faster inference with multi-token prediction drafters

Google's Gemma 4 inference engine gains a significant speed boost through the introduction of multi-token prediction drafters, a novel technique that leverages sequence-to-sequence models to accelerate large language model processing. By reducing the computational overhead of token-by-token prediction, Gemma 4 achieves up to 2.5x faster inference times on complex tasks. This optimization is poised to further democratize access to large language models in resource-constrained environments. AI-assisted, human-reviewed.