
Today the US made encryption illegal in slow motion, and nobody noticed
Eleven days ago, on a Friday, Meta turned off end-to-end encryption on Instagram DMs. They posted a short blog about it. Almost nobody covered the story. Most users have no idea it happened.
Today, May 19, the reason became obvious.
A federal law called the Take It Down Act takes effect today. It says platforms have to remove non-consensual nudes and deepfakes within 48 hours of a takedown notice. Sounds reasonable. Reads great on the floor of the Senate. Got bipartisan support, signed by Trump exactly a year ago.
The catch: it contains no exception for encryption. If you can't read your users' messages, you can't scan them, you can't comply, and the FTC bills you $53,088 per violation.
For Instagram, which has about a billion users, that math gets ugly fast. So Meta did the only thing a publicly traded company can do: they killed the encryption.
They picked the most honest of the four available options. Here are all four, because every encrypted app on Earth is about to pick one of them:
Crack the lock. Read messages on your server. Tell users encryption is "evolving."
Install a snitch on the user's phone. Scan the message BEFORE encrypting it. Tell users the encryption "still works."
Eat the fines. Bleed out one quarter at a time.
Pull out of the country.
Meta took door 1.
TikTok took door 4 by simply never building encryption in the first place.
WhatsApp is about to walk through door 2 with a big PR smile and call it a "trust and safety update."
Door 2 is the one that should terrify you, because it sounds harmless.
Picture a safe. You put a letter inside, close the lid, only the recipient has the key. That's end-to-end encryption. The dream cypherpunks fought for in the nineties.
Now imagine a small security camera mounted on the INSIDE of the safe. Pointed at you. It photographs every letter before the lid closes and ships those photos to a server you don't control, run by people you've never met, under the authority of a government you might not have voted for.
The lock still works. The math still checks out. Your safe is technically "still secure." You can put that on the marketing site.
But the camera is in the room before you ever lock the door.
Apple proposed exactly this in 2021. They called it CSAM scanning. The public lost its mind. Edward Snowden, Matt Green, the EFF, 90 organizations signed an open letter. Apple paused.
That was the last time the public stopped it. The Take It Down Act, the EU's Chat Control 2.0, the UK Online Safety Act, India's traceability mandate, and roughly six other laws in motion right now have all decided that pausing is no longer an option. The fines make pausing irrational. The PR makes pausing impossible. The cameras are coming back online. Quietly. One platform at a time.
Here's the part nobody wants to say out loud:
If you use Instagram DMs today, your messages are no longer private.
If you use TikTok DMs, they never were.
If you use iMessage, the camera is already shipped, just not switched on yet.
If you use WhatsApp, you have maybe twelve months before the same announcement.
The only apps that survive this aren't the ones with better marketing. They're the ones with worse architecture for compliance.
A messenger that wants to genuinely survive the next ten years of legal pressure has to refuse to have three things:
A headquarters where subpoenas can land.
A signed binary the platform can update with whatever code a government asks for.
A user identity tied to your real name, phone, or email.
Signal still flies the privacy flag from inside the corporate jungle, but they survive on Brian Acton's money and Moxie's philosophical stubbornness. They're an exception, not a strategy.
The structural future lives somewhere weirder.
SimpleX has no user identifiers at all. Matrix is federated. There's a small but growing set of wallet-native messengers (I work on one called ANO, full disclosure) where your "account" is just a cryptographic keypair you own. No email. No phone. No central server that can be forced to flip a switch.
They're clunkier. They look intimidating. The addresses are long strings instead of phone numbers. You have to back up a key file. None of them have a Super Bowl ad.
But they have one thing every centralized messenger is losing today: nobody can force them to put a camera in the safe. There's no platform to compel. The protocol runs between users' devices. The clients are open source. If a scanner ever gets added, the community sees it, forks the code, and routes around it inside a day.
That isn't a feature. That's the architecture refusing to be capturable.
The mainstream era of "encrypted by default" ends today. Not loudly. Not with a single news story. With a slow drift, a sequence of small compliance moves, and a generation of users who will never quite figure out when the privacy they thought they had quietly stopped existing.
Five years from now, "private messaging" won't mean the encrypted feature on a centralized app. It will mean the apps that can't be scanned, can't be pressured, and can't be shut down without taking down the network itself.
The camera goes in the house when the house belongs to someone else.
Start building your own. Or at least pick a messenger built by someone who already did.