Signal Foundation president Meredith Whittaker warned that artificial intelligence agents embedded within operating systems are eroding the practical security guarantees of end-to-end encryption. The remarks were made during an interview with Bloomberg at the World Economic Forum in Davos.
While encryption remains mathematically sound, Whittaker argued that its real-world protections are increasingly bypassed by the privileged position AI systems occupy inside modern user environments. The veteran researcher, who spent more than a decade at Google, pointed to a fundamental shift in the threat model where AI agents integrated into core operating systems are being granted expansive access to user data.
To function as advertised, these agents must be able to read messages, access credentials, and interact across applications, collapsing the isolation that end-to-end encryption relies on. This undermines the assumptions that secure messaging platforms like Signal are built on, according to Whittaker.
A recent investigation by cybersecurity researcher Jamieson O’Reilly uncovered exposed deployments of Clawdbot, an open-source AI agent framework, that were directly linked to encrypted messaging platforms such as Signal. In one case, an operator had configured Signal device-linking credentials inside a publicly accessible control panel, allowing anyone who discovered the interface to pair a new device to the account and read private messages in plaintext.
Signal is widely used by journalists, activists, and government and military personnel around the world. Its Signal Protocol is considered a gold standard in modern cryptography and is also used by platforms such as WhatsApp and Google Messages.
Whittaker described how AI agents are marketed as helpful assistants but require sweeping permissions to work. These systems are pitched as tools that can coordinate events or communicate on a user’s behalf, but to do so they must access calendars, browsers, payment methods, and private messaging apps, placing decrypted messages directly within reach of the operating system.
She characterized this architectural shift as “breaking the blood-brain barrier” between applications and the operating system. Once that boundary is crossed, either through compromise or intentional design choices, individual apps can no longer guarantee privacy on their own.
O’Reilly identified hundreds of exposed control panels reachable over the public internet, some lacking any authentication. These interfaces provided access to full conversation histories, API keys, OAuth tokens, and command execution features across services including Slack, Telegram, Discord, WhatsApp, and Signal.
The researcher said the issue extends beyond individual bugs and reflects a broader pattern. AI agents require extensive privileges to function, yet they are frequently deployed without adequate security hardening. Common misconfigurations can expose systems to the internet unintentionally, and concentrating credentials and conversation history in a single system creates an attractive target for attackers.
Whittaker emphasized that although the Signal Protocol itself remains cryptographically secure, privacy in practice depends on the security of the entire system. If the layer that processes decrypted messages is compromised, the protections encryption provides become irrelevant.







