All News

Experts Warn Against Trusting XChat Encryption

X has launched XChat with claims of end-to-end encryption, but cryptographers say the implementation is unsafe. Key concerns: private keys stored on X servers (protected by a four-digit PIN), unclear use of HSMs, vulnerability to insider or company-led man-in-the-middle attacks, no perfect forward secrecy, and closed-source code. Experts advise treating XChat like unencrypted DMs until audited.

Published September 5, 2025 at 01:12 PM EDT in Cybersecurity

XChat raises red flags despite end-to-end encryption claims

X, the company formerly known as Twitter, has begun rolling out XChat — a new messaging option the company says is end-to-end encrypted. But cryptography experts are warning that the current implementation should not be treated as secure.

On setup, X asks users to create a four-digit PIN that encrypts the user's private key, and then stores that private key on X's servers. That design departs sharply from how mature systems like Signal handle keys — Signal stores private keys on the user's device, not on provider servers.

Primary technical concerns

  • Private keys stored on X servers and protected by a four-digit PIN — subject to brute-force risk if key storage isn't hardened.
  • Unclear use or proof of hardware security modules (HSMs) — without verifiable HSM controls, X could access or tamper with stored keys.
  • Architecture allows an adversary-in-the-middle scenario: X itself or a malicious insider could issue keys and intercept conversations.
  • No perfect forward secrecy — compromise of a private key could expose past or multiple messages, depending on implementation.
  • Code and cryptographic details are not yet open source or independently audited, so claims cannot be independently verified.

Security researchers including Matthew Garrett and Matthew Green have publicly voiced skepticism. Garrett warned that without verifiable HSM usage and stronger key controls, XChat’s approach is technically weaker than Signal’s. Green advised treating XChat like an unencrypted DM until it undergoes a reputable audit.

What this means for users and organizations

If you handle sensitive data, do not assume XChat provides the same guarantees as mature, audited E2EE platforms. The combination of server-side private keys, weak PIN entropy, and lack of perfect forward secrecy widens the attack surface for insiders, nation-state actors, or a future change in corporate behavior.

Practical next steps

  • Assume current XChat is not a drop-in replacement for audited E2EE channels.
  • Delay moving high-value conversations to XChat until X publishes technical details, open-sources the code, and completes third-party audits.
  • Ask vendors for proof-of-HSM controls, an auditable key lifecycle, and forward-secrecy guarantees before adoption.

At a strategic level, this is a reminder that 'end-to-end encryption' is a claim with many technical subtleties. The devil is in key custody, observable proofs of implementation, and whether independent experts can reproduce and review the system.

QuarkyByte's approach to similar rollouts is to map threat scenarios, validate vendor controls against those scenarios, and translate findings into clear operational guardrails. Organizations should demand verifiable cryptography, insist on independent audits, and align any messaging adoption with compliance and incident-response plans.

For now, treat XChat as an experiment — potentially useful for casual encrypted conversations but not yet suitable for high-risk or regulated communications until the company proves its claims.

Keep Reading

View All
The Future of Business is AI

AI Tools Built for Agencies That Move Fast.

If your organization is evaluating XChat or other encrypted messaging, QuarkyByte can validate vendor cryptography claims, assess key-management risks, and map mitigations to your compliance posture. Request a tailored risk brief and technical checklist to protect sensitive communications.