Meta’s Enhanced Encryption for Backups: HSM Vault and New Key Distribution
The Foundation: HSM-Based Backup Key Vault
Meta has built a robust system for protecting end-to-end encrypted backups in messaging platforms like WhatsApp and Messenger. At the heart of this system is the HSM-based Backup Key Vault, which ensures that users’ recovery codes are stored securely inside tamper-resistant hardware security modules (HSMs). These modules are designed to be inaccessible to Meta, cloud storage providers, and any third party. Users protect their backed-up message history with a recovery code, which is generated and stored exclusively within this vault.

Resilience Through Geographically Distributed HSMs
The Backup Key Vault is not a single point of failure—it is deployed as a geographically distributed fleet spanning multiple datacenters. The system employs a majority-consensus replication protocol, meaning that even if some HSMs go offline, the fleet remains operational and able to serve recovery codes. This design ensures high availability and durability for millions of users worldwide.
Recent Enhancements to Encrypted Backups
Late last year, Meta simplified the process of encrypting backups by introducing passkey support. Now the company is strengthening the underlying infrastructure with two key updates: over-the-air fleet key distribution for Messenger and a commitment to publishing evidence of secure fleet deployments.
Over-the-Air Fleet Key Distribution for Messenger
In WhatsApp, the public keys of the HSM fleet are hardcoded into the application, which works well for a single fleet. However, Messenger requires the ability to deploy new HSM fleets without forcing users to update the app. To solve this, Meta built a mechanism to distribute fleet public keys over the air as part of the HSM response. These keys arrive in a validation bundle signed by Cloudflare and then counter-signed by Meta, providing independent cryptographic proof of authenticity. Cloudflare also maintains an audit log of every bundle issued, enabling verification at any time. The full protocol is detailed in Meta’s whitepaper, “Security of End-To-End Encrypted Backups.”

Publishing Evidence of Secure Fleet Deployments
Transparency is critical to building trust. Meta now publishes evidence of each new HSM fleet deployment on its engineering blog. These deployments are infrequent—typically every few years—but each one must be shown to follow the secure deployment process. Users can verify the evidence themselves by following the audit steps outlined in the whitepaper. This move cements Meta’s leadership in the area of secure encrypted backups and allows independent researchers to confirm that Meta cannot access users’ encrypted data.
Transparency and Verification
The combination of over-the-air key distribution and published deployment evidence gives users and security experts the tools they need to verify the integrity of the Backup Key Vault. For a complete technical specification, refer to the full whitepaper: “Security of End-To-End Encrypted Backups.”