Next Article in Journal
WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication
Previous Article in Journal
Adaptive Privacy-Preserving Insider Threat Detection Using Generative Sequence Models
Previous Article in Special Issue
Emotional Sequencing as a Marker of Manipulation in Social Media Disinformation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation

Department of Information Management, Central Police University, Taoyuan 333322, Taiwan
Future Internet 2026, 18(1), 12; https://doi.org/10.3390/fi18010012 (registering DOI)
Submission received: 11 November 2025 / Revised: 14 December 2025 / Accepted: 24 December 2025 / Published: 26 December 2025
(This article belongs to the Special Issue Information Communication Technologies and Social Media)

Abstract

Instant messaging (IM) applications are ubiquitous, and while end-to-end encryption protects message content, traffic metadata remains observable. This paper proposes a traffic correlation framework for IM call services under a passive ISP-level threat model to infer communication parties from encrypted traffic. The framework extracts and matches metadata from sustained, bidirectional call flows and jointly analyzes endpoint identifiability, shared server connectivity, symmetry in call duration and traffic volume, and service type indicators to derive correlation artifacts for matching. The framework is instantiated and evaluated on WhatsApp, Facebook Messenger, and Snapchat across diverse user behavior scenarios and commonly deployed network settings. Experimental results show that the method reliably links caller and callee flows, revealing edges in users’ social graphs without decrypting any packets. Under typical data retention regimes, these findings indicate that metadata-based correlation provides a practical basis for deanonymization and represents a persistent privacy risk for users of IM calling.
Keywords: surveillance; network traffic records; traffic analysis; user privacy surveillance; network traffic records; traffic analysis; user privacy

Share and Cite

MDPI and ACS Style

Li, C.-Y. Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation. Future Internet 2026, 18, 12. https://doi.org/10.3390/fi18010012

AMA Style

Li C-Y. Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation. Future Internet. 2026; 18(1):12. https://doi.org/10.3390/fi18010012

Chicago/Turabian Style

Li, Chen-Yu. 2026. "Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation" Future Internet 18, no. 1: 12. https://doi.org/10.3390/fi18010012

APA Style

Li, C.-Y. (2026). Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation. Future Internet, 18(1), 12. https://doi.org/10.3390/fi18010012

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop