Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Privacy rankings of popular messaging apps in 2025 | Kaspersky official blog

-1
Medium
Vulnerability
Published: Fri Oct 24 2025 (10/24/2025, 16:14:52 UTC)
Source: Kaspersky Security Blog

Description

Comparing WhatsApp, Discord, Snapchat, Facebook Messenger, and Telegram, based on their privacy settings and the amount of data they collect.

AI-Powered Analysis

AILast updated: 11/08/2025, 03:02:16 UTC

Technical Analysis

The Kaspersky blog post summarizes a comprehensive 2025 privacy ranking study by Incogni, comparing popular messaging apps on privacy criteria including data collection, default privacy settings, government data request compliance, and encryption. Discord ranks highest overall due to limited data collection and fewer privacy fines but has less private default settings. Telegram and Snapchat offer the most private default configurations and extensive privacy controls. WhatsApp excels in protecting against strangers and provides full end-to-end encryption by default, a critical security feature not matched by Telegram, which does not encrypt chats end-to-end by default. Facebook Messenger ranks lowest in privacy. The study also highlights that WhatsApp chats with Meta’s AI assistant are used for AI training without opt-out, raising privacy concerns. Government cooperation rates vary, with Snapchat approving 82% of requests, Meta’s services 78%, and Discord 77.4%, while Telegram’s rate is undisclosed but nonzero. Data collection varies between general policy and mobile app telemetry, with Telegram collecting the least data. Desktop clients and third-party or modified apps pose additional risks due to architectural vulnerabilities and malware distribution. The report advises caution with unofficial clients and recommends using official mobile apps with strong privacy settings. The analysis underscores the importance of privacy settings, encryption, and user awareness to mitigate risks from data leaks, social engineering, and unauthorized access.

Potential Impact

For European organizations, the privacy and security posture of messaging apps directly affects the confidentiality of internal communications and personal data protection compliance under GDPR. Apps with weaker default privacy settings or extensive data collection increase the risk of data leakage, unauthorized access, and surveillance by third parties, including governments. The use of platforms that cooperate extensively with government data requests may expose sensitive corporate or personal information. The lack of end-to-end encryption by default in some apps (e.g., Telegram) can lead to interception risks. Desktop and third-party clients introduce additional attack surfaces, potentially enabling malware infections or account hijacking. Social engineering attacks exploiting these platforms can compromise employee accounts, leading to data breaches or fraud. Organizations relying on these apps for communication must consider these risks in their security policies and incident response plans. Privacy-conscious apps reduce exposure but require proper configuration and user training. Failure to address these risks can result in reputational damage, regulatory penalties, and operational disruptions.

Mitigation Recommendations

European organizations should: 1) Prefer messaging apps with strong default privacy settings and end-to-end encryption, such as WhatsApp for sensitive communications, while recognizing Telegram’s limitations. 2) Enforce strict account security policies including multi-factor authentication and regular user training to mitigate social engineering risks. 3) Avoid use of unofficial or modified clients and restrict desktop client usage where possible, or ensure they are updated and secured. 4) Regularly audit and configure privacy settings to minimize data exposure, including limiting data sharing and opting out of AI training where possible. 5) Monitor and control app permissions on corporate devices to reduce telemetry data collection. 6) Develop incident response plans addressing account hijacking and phishing attacks via messaging platforms. 7) Educate employees about risks of scams and phishing through messaging apps. 8) Consider alternative niche private messaging solutions for highly sensitive communications. 9) Collaborate with legal and compliance teams to understand implications of government data requests and data retention policies. 10) Utilize endpoint protection solutions that detect malicious links and apps distributed via messaging platforms.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/messengers-privacy-rating-2025/54665/","fetched":true,"fetchedAt":"2025-10-24T16:18:28.546Z","wordCount":1636}

Threat ID: 68fba6d444c617250775d1ec

Added to database: 10/24/2025, 4:18:28 PM

Last enriched: 11/8/2025, 3:02:16 AM

Last updated: 12/9/2025, 6:35:26 PM

Views: 437

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats