Meta has reported that it will stop supporting the extreme-to-end encryption (E2EE) in Instagram messages after 8 May 2026. According to the company, those with affected conversations will be instructed to download the content they want to keep, and in some cases it will be necessary to update the application before this process can be completed; the official note is available at the Instagram help center: help.instagram.com.
For those who are not familiar with data export procedures, Instagram already offers mechanisms to recover photos, videos and conversations: if you are saving material before the change, check the platform's data guide to request and download your information safely Here.. It is also appropriate to check whether your account has the version of the courier using encryption activated; the encrypted message function was only available in a limited way and was not enabled by default in all regions - Instagram itself explains its deployment and availability in this document - help.instagram.com.

The extreme-to-end encryption began to be tested in Instagram in 2021 as part of Meta's commitment to a "more private" ecosystem, and at the start of the war between Russia and Ukraine the company temporarily expanded access to encryption in these areas, a movement that covered the technological press at the time according to TechCrunch. Now, however, Meta's decision to withdraw the support raises questions about the direction the big platforms take in the balance between privacy and public security.
What exactly is the end to end encryption and why does it matter? In essence, E2EE ensures that only the devices of the interlocutors can decipher the content of a conversation: neither the service provider nor third parties can read these messages while travelling or when stored in transit. Encryption advocates insist that it is an essential safeguard against espionage, mass leaks and unauthorized access to personal data; organizations dedicated to the defence of privacy, such as the Electronic Frontier Foundation, offer technical and legal context on why this type of protection is key to digital rights EFF - Encryption.
In the face of this, child protection authorities and associations have been warning that encryption can become a shelter for illegal activities, in particular for the dissemination of child sexual abuse material or the planning of criminal acts. This clash of priorities - individual privacy in the face of the possibility that services cannot collaborate with judicial investigations - is known in technical and police forums as the "Going Dark" phenomenon. In addition, journalistic research has shown that, as early as 2019, within Meta, there were internal warnings about the effects that full encryption would have on the company's ability to detect and report illegal content; Reuters documented these discussions and their implications for corporate decisions on encryption Reuters report.

The debate is not just about companies and police: regulators in Europe have put the issue on their agenda. The European Commission announced that it will work on a "technological map" to explore solutions that allow legal access to encrypted data by law enforcement without undermining cybersecurity or fundamental rights, a process that seeks technical and legal alternatives to the absolute dichotomy between privacy and security European Commission - Roadmap on encryption.
For users, the news has immediate practical effects: in addition to the possibility of losing access to encryption, decisions on what to keep and how to do so have to be made. It is worth reviewing the conversations you consider sensitive and download any file or message you want to preserve, and check that your application is up to date to be able to run the steps that Target indicates. From a broader perspective, the withdrawal of the E2EE support in Instagram raises an important reflection on how we want social networks to work: whether we prioritize the total confidentiality of communications or whether we accept solutions that facilitate the prosecution of crimes at the expense of certain limitations on the secret of talks.
The history of encryption on messaging platforms will continue to evolve. There will be regulatory pressures, business decisions and technical advances that try to combine rights and security. In the meantime, it is appropriate to be informed in reliable sources and to maintain proactive control over the data themselves: the route to protect privacy today goes by knowing the available tools, taking advantage of the data export options and being attentive to the decisions that companies announce about how they manage the security of our communications.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...