Delta Chat<p><a href="https://chaos.social/tags/Whatsapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whatsapp</span></a> on <a href="https://chaos.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> had a severe 0day that was exploited in the wild for some months, and is fixed with august 20th releases <a href="https://hackread.com/whatsapp-0-day-exploit-attack-targeted-ios-macos-users/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/whatsapp-0-day-ex</span><span class="invisible">ploit-attack-targeted-ios-macos-users/</span></a></p><p>Last year <a href="https://chaos.social/tags/signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>signal</span></a> also had its multi-device functionality exploited in the wild. <a href="https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/02/hack</span><span class="invisible">ers-exploit-signals-linked-devices.html</span></a></p><p>FWIW <a href="https://chaos.social/tags/deltachat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deltachat</span></a> has a dumber multi-device sync model, no device linking, depends on being in the same WiFI for setup (therefore no easy remote exploits), and <a href="https://chaos.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> signatures and verification for ongoing usage (like all other E2EE messages).</p>