Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WhatsApp View Once Bypass Found, Meta Won’t Fix

WhatsApp View Once Bypass Found, Meta Won’t Fix

Posted on March 18, 2026 By CWS

A recent discovery by cybersecurity researcher Tal Be’ery has uncovered a new way to bypass WhatsApp’s View Once feature. Despite this finding, Meta, the parent company of WhatsApp, has decided not to patch the vulnerability, citing that it involves the use of a modified client application.

Understanding WhatsApp’s View Once Feature

The View Once feature on WhatsApp allows users to send media that disappears after being viewed. It is designed to prevent recipients from saving, forwarding, or capturing the content. However, Be’ery, who is also the co-founder and CTO of Zengo, has identified multiple ways to circumvent this feature over the past years.

Previously, WhatsApp developers patched similar vulnerabilities reported by Be’ery, for which he even received a bug bounty. The latest method, however, involves a modified WhatsApp client which has led Meta to exclude it from their bug bounty coverage.

Meta’s Response to the Bypass

Meta’s stance on the recent vulnerability is that it falls outside their security model. The company argues that it’s nearly impossible to prevent all forms of capturing the View Once media, as users can resort to external devices or modified clients. Consequently, Meta has decided not to patch this particular issue.

Meta clarified that the View Once feature is intended to be an extra privacy measure for media shared between trusted contacts on the official WhatsApp application. The company emphasized that the feature should not be seen as a forensic-grade data deletion tool.

Suggestions for Enhancing Security

To address such bypass vulnerabilities, Be’ery suggests the implementation of a digital rights management (DRM) system. He believes this would help in preventing the misuse of View Once media. However, Meta has expressed concerns over this suggestion, citing potential drawbacks and limitations of DRM in a private messaging context.

Despite the ongoing debate, Meta continues to enhance the security of the View Once feature within its official applications, distinguishing these efforts from vulnerabilities arising due to rogue clients. The company appreciates Be’ery’s contributions but maintains that the involvement of unofficial clients is beyond the scope of its current security measures.

As digital communication tools evolve, the challenge of balancing security and user privacy remains a critical concern. WhatsApp’s ongoing efforts to refine its features demonstrate a commitment to providing a secure platform, while acknowledging the inherent limitations of technology against unauthorized access and exploitation.

Security Week News Tags:bug bounty, Cybersecurity, digital rights management, DRM, Meta, modified client, Security, Tal Be'ery, View Once, WhatsApp

Post navigation

Previous Post: Malware Targets Argentine Courts with Fake Documents
Next Post: Vidar 2.0 Malware Targets Gamers via Fake Cheats

Related Posts

US Offers  Million for Three Russian Energy Firm Hackers US Offers $10 Million for Three Russian Energy Firm Hackers Security Week News
Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Security Week News
Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Security Week News
FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands Security Week News
GitHub Codespaces Vulnerability Exploited for Repository Control GitHub Codespaces Vulnerability Exploited for Repository Control Security Week News
Chip Programming Firm Data I/O Hit by Ransomware Chip Programming Firm Data I/O Hit by Ransomware Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mesh CSMA: Breaking Attack Paths to Sensitive Data
  • Vidar 2.0 Malware Targets Gamers via Fake Cheats
  • WhatsApp View Once Bypass Found, Meta Won’t Fix
  • Malware Targets Argentine Courts with Fake Documents
  • Boggy Serpens Intensifies Cyberattacks on Global Targets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mesh CSMA: Breaking Attack Paths to Sensitive Data
  • Vidar 2.0 Malware Targets Gamers via Fake Cheats
  • WhatsApp View Once Bypass Found, Meta Won’t Fix
  • Malware Targets Argentine Courts with Fake Documents
  • Boggy Serpens Intensifies Cyberattacks on Global Targets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark