Meta Advances End-to-End Encrypted Backups with HSM Vault Upgrades
<h2 id="hsm-backup-key-vault">The Foundation: HSM-Based Backup Key Vault</h2>
<p>Meta has built a sophisticated infrastructure known as the <strong>HSM-based Backup Key Vault</strong> to secure end-to-end encrypted backups for both WhatsApp and Messenger. This system empowers users to protect their chat history with a recovery code, which is stored inside <em>tamper-resistant hardware security modules (HSMs)</em>. Critically, neither Meta, cloud storage providers, nor any third party can access this code. The vault operates as a geographically distributed fleet across multiple data centers, ensuring resilience through a <strong>majority-consensus replication</strong> mechanism.</p><figure style="margin:20px 0"><img src="https://engineering.fb.com/wp-content/uploads/2026/05/Meta-Strengthening-E2EE-backups-Hero-1-1.png" alt="Meta Advances End-to-End Encrypted Backups with HSM Vault Upgrades" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: engineering.fb.com</figcaption></figure>
<h2 id="passkeys-and-infrastructure">Passkeys and Infrastructure Strengthening</h2>
<p>Toward the end of last year, Meta simplified the process of enabling end-to-end encryption for backups using passkeys. Now, the company is reinforcing the underlying infrastructure that protects <em>password-based</em> end-to-end encrypted backups with two significant updates: <strong>over-the-air fleet key distribution</strong> for Messenger and a commitment to <strong>publishing evidence of secure fleet deployments</strong>.</p>
<h3 id="over-the-air-fleet-key-distribution">Over-the-Air Fleet Key Distribution</h3>
<p>To verify the authenticity of an HSM fleet, client applications must validate the fleet's public keys before establishing a secure session. In WhatsApp, these keys are <strong>hardcoded</strong> into the application itself. However, to support Messenger—where new HSM fleets may need to be deployed without forcing users to update the app—Meta devised a method to distribute fleet public keys <em>over the air</em> as part of the HSM's response. These keys are delivered in a <strong>validation bundle</strong> that is signed by Cloudflare and then counter-signed by Meta, providing independent cryptographic proof of their authenticity. Additionally, Cloudflare maintains an <strong>audit log</strong> of every validation bundle issued. The complete validation protocol is detailed in Meta's whitepaper, “Security of End-To-End Encrypted Backups.”</p><figure style="margin:20px 0"><img src="https://engineering.fb.com/wp-content/uploads/2026/05/Over-the-Air-Fleet-Key-Distribution.png" alt="Meta Advances End-to-End Encrypted Backups with HSM Vault Upgrades" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: engineering.fb.com</figcaption></figure>
<h3 id="transparent-fleet-deployment">Transparent Fleet Deployment</h3>
<p>Transparency in the deployment of the HSM fleet is essential to demonstrating that the system behaves exactly as designed and that Meta cannot access users' encrypted backups. To this end, Meta will now <strong>publish evidence of the secure deployment</strong> of each new HSM fleet on this blog page—further cementing its leadership in secure encrypted backups. New fleet deployments are infrequent, typically occurring no more than once every few years. Meta commits to proving that each new fleet is deployed securely, and <a href="#verification-steps">any user can verify this</a> by following the steps outlined in the Audit section of the whitepaper.</p>
<h2 id="whitepaper-reference">Technical Specification</h2>
<p>For the complete technical specification of the HSM-based Backup Key Vault, including the full validation protocol and audit procedures, refer to the whitepaper titled <strong>“Security of End-To-End Encrypted Backups.”</strong> This document provides an in-depth look at the architecture and security guarantees of the system.</p>
<h3 id="verification-steps">How Users Can Verify Fleet Deployments</h3>
<p>As mentioned, users can independently verify that each newly deployed HSM fleet is genuine and secure. The process involves downloading the published evidence from this blog, cross-referencing it with the Cloudflare audit log, and following the cryptographic verification steps described in the whitepaper. This ensures that the HSM fleet is exactly what Meta claims and that no unauthorized modifications have occurred.</p>
Tags: