đŹđ§ WhatsApp changes skin, but privacy stays naked
When a messaging app has 3.5 billion active accounts (out of 8 billion âterransâ â too many), itâs no longer âjustâ an app: itâs planetary infrastructure. Today, WhatsApp carries a massive share of private and professional communication worldwide (and a lot of scam, but thatâs for another piece).
In the last few months, two things collided:
- a research paper from the University of Vienna showing how easy it was to enumerate basically all WhatsApp accounts starting from phone numbers (paper)
- WhatsAppâs decision to push usernames instead of phone numbers in interactions, marketed partly as a response to scraping and data exposure (coverage)
Letâs put them together, numbers in hand, and see what really changes âbefore and afterâ usernames.
 
The âHey there! You are using WhatsAppâ study
The paper âHey there! You are using WhatsApp: Enumerating Three Billion Accounts for Security and Privacyâ is authored by a research team from the University of Vienna and SBA Research.
Brutal summary: by abusing the way WhatsApp does contact discovery (matching your address book against its global user database), the researchers:
- generated 63 billion âplausibleâ phone numbers across 245 countries
- queried WhatsAppâs infrastructure via XMPP, not the app UI
- identified 3,546,479,731 distinct accounts (3.5+ billion) globally
And it wasnât just ânumber exists / doesnât existâ. For a huge share of those accounts, WhatsApp returned metadata:
- >57% of users had a public profile picture
- at least 29% exposed an âaboutâ status
- around 9% of accounts were marked as business
In that public âaboutâ field they found, among other things:
- political, religious and sexual identity statements
- references to drug use or sales
- links to other profiles (LinkedIn, Instagram, Tinder, OnlyFans, âŚ)
- email addresses, including those of government and military organizations
Net result: a potential dataset on a scale weâve never seen before (letâs repeat that calmly: 3.5 billion numbers, profiles and cryptographic keys) which, in the wrong hands, would make almost any âclassic data breachâ look small.
 
This isnât theory: sensitive countries and old leaks that never die
1. Countries where WhatsApp is (or was) banned
By the end of 2024 WhatsApp was officially banned in China, Iran, Myanmar and North Korea. Despite that, the researchers found:
- around 2.3 million Chinese numbers
- around 1.6 million accounts in Myanmar
- around 59 million active accounts in Iran (almost two-thirds of its 90.1M population)
- 5 numbers using North Korean numbering
In these contexts, the simple fact that a number is seen as a WhatsApp user can have political and personal safety implications.
2. Connection to the 2019/2021 Facebook leak (yes, that one)
The authors cross-referenced their dataset with the infamous Facebook leak (about 488 million scraped phone numbers):
- 58% of those numbers were still active on WhatsApp at the time of analysis
- in countries like Egypt, Italy, Saudi Arabia, around 40% of current WhatsApp numbers also appeared in the leak
Translated into OSINT terms: once a number is âoutâ, it stays useful for years for phishing, spam, targeted social engineering and political or commercial profiling.
 
The hardcore part: speed and depth of enumeration
One detail that makes security engineers twitch is the speed of the enumeration:
- the researchers were able to query over 100 million numbers per hour without hitting effective rate limits
- in their report to Meta they explicitly state a speed of 25 million numbers per hour per session
Weâre not talking about a âslightly aggressive scanâ here, but the ability, for an attacker with moderate resources, to:
- run a worldwide census of WhatsApp users
- enrich it with profile pictures, about texts, business flag, public keys and activity timestamps
- use it as a âmaster indexâ to merge with other leaks (Facebook, marketing databases, data brokers, government datasets)
Itâs the erotic dream of any OSINT analyst and of any threat actor (especially state-sponsored) with a taste for surveillance â and not just them.
 
WhatsAppâs answer: âthis is not a security vulnerabilityâ
After initially classifying the report as ânot applicableâ, from September 2025 onward WhatsApp cooperated with the researchers and rolled out countermeasures, confirmed as active in early October 2025.
Main measures:
- Cardinality counters and advanced rate limiting
WhatsApp added counters tracking how many distinct accounts a client queries, and feeds those into machine learning models to tell normal usage from systematic scraping, applying much stricter limits to the latter. - Restrictions on data visibility
Even if set to âeveryoneâ, the number of new profiles and about texts a single account can query is now limited, to make mass crawling impractical. Business profiles are partially exempt for commercial discoverability reasons. - Removal of profile-picture timestamps
Previously, each profile picture was served with a timestamp, allowing an attacker to estimate how long an account had been active or unchanged. That information is now gone. - Fixes for cryptographic key reuse
Some Android-side bugs caused X25519 key reuse between accounts or after number changes â fixed in WhatsApp 2.25.26.11 and later.
In the updated paper, WhatsApp:
- thanks the bug bounty community
- insists this does not demonstrate a âsecurity vulnerabilityâ in the strict sense
- states they have no evidence of abusive mass scraping using this technique
Letâs be cold about it:
- can we really say this isnât a vulnerability?
From a protocol design standpoint, a system based on phone numbers + contact discovery is inherently exposed to enumeration. Itâs not a buffer overflow; itâs a structural risk, a property of the design. - âno evidence of mass scrapingâ â âno abuseâ
It only means they havenât (yet) found clear patterns in the logs. By definition, a serious attacker exploiting a weakness for years tries very hard to not look like a serious attacker.
 
Enter the new model: from SIMs to usernames
In parallel, WhatsApp is rolling out a paradigm shift: the ability to use usernames (with options like âUsernameâ, âPhone numberâ, âUsername with PINâ) to be reached and chat while hiding your phone number (coverage).
The idea is that this should:
- reduce phone number exposure (true)
- make it harder to link a WhatsApp account to a real person by brute-forcing numbers and scraping (also true)
âŚbut how much does it really change risk?
 
Before and after: phone-number-only vs username model
| Before (phone only) | After (usernames optional) | |
|---|---|---|
| Primary identifier | Phone number required for any contact | Phone for registration; username for discovery and interactions |
| Contact discovery | Address book â WhatsApp DB, entirely number-based | Backend still runs on numbers; user can expose only username in new interactions |
| Global-scale enumeration | Technically feasible via API, as shown by the study; now mitigated by rate limits and cardinality counters | Structural risk on the server side remains, but reproducing the original attack is harder |
| Number exposure to new contacts | Every new chat reveals the number | You can keep the number private, using username + PIN for strangers |
| OSINT & data fusion | Phone number = extremely strong pivot across leaks, brokers, public records | Username reduces number spread but becomes a new cross-platform pivot (Telegram, Instagram, GitHub, etc.) |
In plain language: usernames donât fix the structural problem of a WhatsApp architecture built around phone numbers, but they:
- reduce additional exposure of numbers in future interactions
- move part of the game from âphone network identityâ to âonline identityâ (handles, nicknames)
 
What this means for OSINT â and for people who donât want to be profiled
1. The phone number is still the golden key
If an attacker already has your number (because you shared it, itâs in an old leak, itâs on your website, or you kindly filmed it on your boarding pass on TikTok), they can still:
- check if itâs on WhatsApp
- extract whatever residual metadata is available within the new limits
- cross-reference it with older leaks (like the Facebook one, with its 58% still active)
2. The username becomes a new correlation hook
Users and companies love reusing the same handle across platforms. A visible WhatsApp username can often be:
- linked to accounts on Telegram, X, Instagram, GitHub, TikTok, âŚ
- correlated with domains, emails, code repos, CVs and more
For an OSINT analyst this is pure gold. For a careless user, itâs yet another horizontal tracking path.
3. Reduced friction for âsensitiveâ use cases
On the positive side, being able to chat using a handle instead of your phone number is a real advantage for activists, journalists, high-risk professionals who today rely on burner SIMs and secondary numbers.
But that advantage is real only if:
- the number hasnât already spread everywhere
- internal privacy settings (photo, about, last seen, etc.) are locked down or disabled
 
WhatsApp is not âbrokenâ â but the model is fragile
Purely technically, WhatsApp is right on one point: messages remain end-to-end encrypted; nobody has shown practical decryption via server-side key theft.
The problem isnât the cipher; itâs everything around it:
- global enumeration of accounts tied to phone numbers
- rich metadata (photo, about, timestamps, business, public keys) linked to those accounts
- persistence: more than half the numbers in an old scraping campaign are still valid years later
The push toward usernames is an attempt to:
- contain future exposure of phone numbers
- make global-scale enumeration attacks more expensive and noisy
- show regulators and media that âsomething is being doneâ about scraping
Itâs not a magic wand. Itâs a bandage on an infrastructure born in an era when using phone numbers as digital identity seemed like a good idea.
 
What a user can realistically do
Right now, the most effective actions donât involve the new username feature, but boring basics:
- set profile photo and about to âContacts onlyâ or âNobodyâ
- donât put in the about:
- political, religious, health, sexual information
- direct links to other social accounts or OnlyFans, etc.
- work email, especially if governmental / military
- for companies: treat Business accounts as deliberately visible assets and assume they will be profiled
- for high-risk roles (politics, defense, activism, etc.):
- use dedicated numbers
- combine usernames with maximum privacy settings
- consider tools where the phone number is not the primary identifier and the profile itself is encrypted (e.g. Signal profile key)
 
From âphone number = identityâ to a (maybe) more mature model
The Vienna research reminds us of a simple thing: if you use a phone number as the primary key for 3.5 billion people, enumeration is not a bug, itâs a property of the system.
WhatsAppâs introduction of usernames is a step in the right direction to reduce the marginal exposure of numbers and make mass scraping harder, but it:
- doesnât erase the history of already exposed numbers
- doesnât remove the phone number from the backbone of the system
- creates a new correlation surface through reused handles
Anyone working in security, privacy, OSINT or marketing should read these studies not as âtech dramaâ but as x-rays of the platforms weâre sitting on. The move from numbers to usernames is an evolution, not redemption: the game shifts level, it doesnât disappear.
* never upload your contacts: WhatsApp, Telegram, TikTok and any other app that asks for it.