• Cyborg Bytes
  • Posts
  • Who’s Reading Your Messages? The Truth About Privacy You’re Not Ready For

Who’s Reading Your Messages? The Truth About Privacy You’re Not Ready For

Your Private Messages Are Not Private

Every time you send a text or email, do you know who else might be reading it? Most people assume their messages are private. You hit send, the message goes to your recipient, and that’s the end of it, right? Wrong. Your communication is far more vulnerable than you think.

Let’s start with texts. SMS technology, the system that powers most phone-based texting, hasn’t fundamentally changed since it was introduced in 1992. That’s over 30 years of insecure messaging. These texts aren’t encrypted, which means they’re sent “in the clear,” leaving them wide open to interception.

Here’s how it works: when you send a text, it doesn’t go directly to the recipient. Instead, it’s routed through a Short Message Service Center (SMSC), where it’s stored, forwarded, and eventually delivered. While it sits on those servers, it’s completely exposed—anyone with access to those systems can read your messages.

Carriers claim they only retain texts for a few days before deleting them. But leaked documents, like those from Edward Snowden, suggest otherwise. Some carriers appear to retain data for much longer than publicly disclosed. Your personal messages—conversations, passwords, private details—could be stored indefinitely without your knowledge.

And then there’s email. Think of it as the Wild West of communication. Most providers scan your emails automatically, claiming it’s for spam detection, security, or advertising. Companies like Gmail and Yahoo openly admit to analyzing your email content to target you with ads. Even if the process is automated, it still means your private communications are sitting on a server somewhere, being read, logged, and stored.

The bottom line? Your texts and emails are not private, no matter how secure they might feel. And that’s just scratching the surface of how bad it gets.

What Happens When Your Privacy Disappears

Now, imagine what can happen when these vulnerabilities are exploited. A hacker intercepts a text message with a password reset link, and suddenly they have access to your bank account. Or maybe you send sensitive details over email—financial information, medical records, or private conversations—and they’re stored indefinitely on a server. All it takes is one breach, one phishing scam, or one subpoena for someone else to get their hands on your private data.

Here’s how it works: SMS messages pass through SMSC servers, which aren’t designed to be secure. They’re simply routing stations. Anyone with access to these servers—whether it’s your carrier, an employee, or a hacker—can read your messages. Think of it like sending a postcard: every set of hands it passes through can see what’s written.

And carriers’ claims about deleting texts after a few days? Let’s just say the evidence doesn’t always back that up. Leaked NSA documents revealed mass surveillance practices that relied on telecom companies retaining data far longer than they admit. After 9/11, for example, AT&T partnered with the NSA to build secret data-collection rooms across the U.S. These facilities funneled phone calls, emails, and potentially text messages into government surveillance systems. If that’s what’s publicly known, imagine what might still be happening behind the scenes.

But this isn’t just about today’s risks. Let’s talk about what could’ve happened if this technology existed in darker times. Imagine if the Nazi regime had access to these tools. During World War II, they relied on informants, letters, and intercepted communications to identify resistance members, track Jewish families, and suppress dissent. They had to physically open mail or eavesdrop on phone calls—a labor-intensive and imperfect process.

Now, picture the same regime equipped with SMS systems and modern email servers. Every text, every email could be scanned for keywords, flagged, and stored indefinitely. Resistance fighters sharing plans? Tracked instantly. Jewish families coordinating escapes? Located in seconds. Dissenters speaking out against the government? Identified, logged, and silenced before they could act.

This isn’t just speculation. Surveillance technology is inherently a tool of power, and in the wrong hands, it can be used to oppress entire populations. Governments have already used surveillance to target political dissidents, journalists, and activists. In a system where your private messages are not only accessible but stored indefinitely, abuse isn’t just possible—it’s inevitable.

Think about this: what happens when a carrier is hacked? Or if a government subpoena demands years of your messages? What if a phishing email tricks you into handing over access to everything? When you rely on insecure communication systems, you’re gambling with your privacy—and the stakes couldn’t be higher.

The ability to monitor and control communication has been a tool of oppression throughout history. Today’s insecure systems make it easier than ever to misuse that power. If this doesn’t make you rethink how you send messages, it should. It’s time to take back control of your privacy.

How Kevin Mitnick Exposed the Flaws in Our Communications

If you believe unencrypted communication is “good enough,” Kevin Mitnick’s story will make you think again. Mitnick wasn’t just any hacker; he was the hacker—the one who showed the world just how vulnerable our systems could be. He didn’t need a team of supercomputers or sci-fi hacking tools. Instead, he relied on two things: human error and the flaws baked into unsecured communication systems like email.

One of his classic tricks involved email spoofing. Mitnick would intercept corporate emails and manipulate their contents to fool employees into revealing sensitive information—passwords, system configurations, you name it. These employees weren’t careless; they just trusted the tools they used every day, tools that had no built-in protections against manipulation.

His hacks didn’t stop with email. Mitnick exploited unsecured communication channels of all kinds, showing how easily systems crumble when the messages we rely on are unprotected. These breaches weren’t about brute force. They were about the inherent weakness of leaving messages exposed—unguarded and available for anyone with the know-how to intercept.

What makes this even scarier is how little has changed. We’re still using communication tools that leave us vulnerable. SMS messages, for example, are routed through carrier servers in plain text. Emails are still scanned and stored on servers where corporations and hackers alike can access them. It’s like we’ve learned nothing from Mitnick’s hacks.

The Lesson: If your messages aren’t encrypted, they’re not private. Period.

So, what’s the solution? It’s time to demand better tools—tools that secure your messages from end to end and lock your data away from prying eyes.

Securing Your Communication

Here’s how you regain control of your privacy:

  1. Use End-to-End Encryption
    Encryption is the digital equivalent of sealing a letter in a vault. With end-to-end encryption, only you and the recipient have the keys to unlock the message. Even if someone intercepts it—whether it’s a hacker, your carrier, or even a government agency—they can’t read it. Tools like Signal and Threema are built with this technology, ensuring your texts stay private no matter what.

  2. Switch to Open-Source Apps
    When it comes to privacy, transparency is everything. Open-source software allows anyone to review the code for vulnerabilities, ensuring there are no hidden backdoors. Apps like Signal thrive because security experts around the world have verified their reliability.

  3. Avoid Data Retention at All Costs
    If a service stores your messages, those messages can be hacked, subpoenaed, or exploited. Use apps that minimize or eliminate data retention altogether. Signal, for example, doesn’t store your messages on their servers. If someone tries to dig them up later, they’ll find nothing but dust.

  4. Secure Your Email
    Email is one of the least secure ways to communicate—unless you’re using the right provider. Platforms like ProtonMail and Tutanota encrypt your inbox and don’t scan your messages for advertising. They also minimize data retention, so your conversations can’t be accessed later.

Your Action Plan:

  • Download Signal or Threema for encrypted texting.

  • Create an account with ProtonMail or Tutanota for secure email communication.

  • Regularly delete sensitive messages and avoid storing important details in plaintext.

  • Start practicing secure communication habits today—because the longer you wait, the more vulnerable you are.

But I use iMessage! I’m protected, right? Wrong.

iMessages are included in this discussion, but with some nuances:

  • End-to-End Encryption: iMessages are encrypted end-to-end when sent between Apple devices (iPhones, iPads, Macs). This means only you and the recipient can read the messages, and Apple cannot access their content.

  • When iMessages Fall Back to SMS: If you’re messaging someone without an Apple device (e.g., Android), your iMessage will fall back to SMS, which is not encrypted. In this case, your messages are routed through the Short Message Service Center (SMSC) and are vulnerable to being scanned, logged, and intercepted.

  • Cloud Backups: Even with end-to-end encryption, if you have iCloud backups enabled, your messages could still be accessed. Apple stores the encryption keys for iCloud, so law enforcement or hackers accessing your iCloud account could retrieve your iMessages from there.

While iMessages between Apple users are generally safer than SMS, they’re not foolproof. For sensitive conversations, apps like Signal or Threema remain the gold standard for privacy because they don’t store data on their servers or rely on backups that could compromise encryption.

What about WhatsApp & Telegram?

If you're considering Telegram or WhatsApp for secure messaging, it's crucial to understand their limitations concerning privacy and data security, particularly in the context of U.S. law enforcement access.

Telegram: Privacy Concerns

Telegram offers end-to-end encryption only for its "Secret Chats," which are not enabled by default. Standard chats are stored on Telegram's servers without end-to-end encryption, making them accessible to the company and potentially to third parties. In a notable case, Telegram's founder, Pavel Durov, was detained in France for not cooperating with authorities investigating criminal activities on the platform, highlighting the tension between privacy and legal compliance.

WhatsApp: Data Sharing with U.S. Authorities

WhatsApp, owned by Meta Platforms (formerly Facebook), implements end-to-end encryption for messages. However, according to WhatsApp's law enforcement guidelines, the company retains data for law enforcement purposes if a valid preservation request is received before a user deletes the content.

This means that while message content remains encrypted, metadata—such as who you communicate with and when—can be preserved and shared with U.S. law enforcement agencies upon request.

Meta Platforms: A History of Privacy Violations

Meta Platforms has faced significant legal challenges regarding user privacy. In 2019, the Federal Trade Commission (FTC) imposed a $5 billion penalty on Facebook for violating consumers' privacy, marking the largest fine ever imposed for such violations.

Additionally, in 2024, Meta agreed to pay $1.4 billion to settle a lawsuit filed by Texas, which accused the company of illegally using facial-recognition technology to gather biometric data of millions of Texans without their consent.

While WhatsApp provides end-to-end encryption, its ownership by Meta Platforms and the potential for metadata sharing with U.S. law enforcement raise concerns about its suitability for sensitive communications.

Telegram's lack of default end-to-end encryption and instances of cooperation with authorities further complicate its standing as a secure messaging platform. For those prioritizing privacy, exploring alternative messaging apps with robust encryption and a strong commitment to user privacy is advisable.

Reclaim Your Privacy, Regain Your Peace of Mind

Imagine this: you send a text or an email, and it’s completely secure. Your private conversations are safe—locked behind layers of encryption that no one, not even the app provider, can break into. You know your carrier isn’t scanning your messages. You know your emails aren’t being stored indefinitely for advertisers or hackers to exploit. You can finally communicate without wondering who’s watching.

With tools like Signal and ProtonMail, this is your new reality. Every message you send is protected. Every piece of private information stays private. No more sleepless nights worrying about whether a data breach will expose your personal details. No more paranoia that your conversations are sitting on a server somewhere, waiting to be exploited.

This transformation isn’t just about protecting your data—it’s about taking back control of your life. For too long, we’ve accepted that surveillance and insecurity are just part of how we communicate. It’s time to say no to that mindset. You deserve privacy, and the tools to achieve it are right in front of you.

Every encrypted message you send is a statement: your privacy matters. Every step you take toward secure communication is a step toward reclaiming your autonomy in a world that constantly tries to take it away.

Start today. Download Signal, secure your email, and lock down your conversations. This is your data, your privacy, and your life. Take it back.

The Time to Act Is Now

Every day you wait, your private messages are at risk. Every unencrypted text, every unsecured email is a potential breach waiting to happen. Your personal conversations, sensitive information, and digital life are too important to leave exposed.

But let’s make this even clearer: the consequences of insecure communication aren’t just personal—they’re societal. Imagine what could happen if a regime like the Nazis had access to today’s technology. During World War II, they relied on physical mail, informants, and tapped phone lines to identify resistance members and Jewish families. It was time-consuming, imperfect, and limited.

Now picture the same regime armed with modern surveillance systems. Every unencrypted text and email could be scanned in seconds for “keywords” tied to dissent. Entire groups could be identified and tracked through location data, social networks, and stored conversations. Resistance movements could be dismantled before they even began. Private lives wouldn’t just be vulnerable—they’d be completely exposed, turned into a weapon against their owners.

The tools already exist. Mass data collection is real. Surveillance programs like those uncovered by Edward Snowden show us how easily governments can monitor and store our communication. The difference between today and a dystopia is who controls that data—and what they decide to do with it.

You have the power to make sure your messages stay out of those hands. By securing your communication, you’re not just protecting yourself. You’re making a statement against the misuse of surveillance and standing up for the principle that privacy is a right, not a luxury.

Take Back Control

Here’s the good news: you have the tools to fight back. By switching to secure tools, you’re standing up for your privacy in a world that constantly tries to strip it away. You’re sending a message that your data, your life, is not up for grabs.

So don’t just think about it. Do it. Today. Right now.

  • Download Signal or Threema and start sending encrypted texts.

  • Set up a ProtonMail or Tutanota account for secure email.

  • Enable 2FA, clear out old messages, and start using a VPN when you’re on public Wi-Fi.

Every encrypted message you send is a small act of resistance. Every step you take toward securing your communication is a step away from leaving yourself and others vulnerable to exploitation.

Your privacy is worth it. Your peace of mind is worth it. Your future is worth it.

Take control of your communication now. The tools are here. The decision is yours. Will you protect what’s yours—or leave it open to whoever’s watching?

Stay Curious,

Addie LaMarr