Among all the other foot-guns here, the underlying design that allows these leaked keys to create these vulnerabilities seems (based just on the article) both unnecessary, and an unintended side effect of rolling one's own crypto on the cheap.
The fact is, we usually have different threat models for different parts of our lives, and different levels of control in how we approach them.
If your work or medical system or whatever requires you to use WhatsApp, use WhatsApp.
If you also want to keep your personal data more private (e.g. who your friends/contacts are, what groups you belong to), you can use Signal for those conversations if you like — you might be interested in persuading your friends to message you there. I also think it is more enshittification resistant; YMMV.
Point is, you don't have to boil the ocean in order to improve your privacy and security, and things will likely shift over time. Pick your battles, and keep it moving.
Time flies like an arrow, but fruit flies like bananas.🦥🏳️🌈:donor:Tech Project Therapist (moderately retired)#ProjectManagement #FinTech #OrganizationalBehavior #Finance My friend Adam and I wrote a contrarian how-to book, Risk Up Front, distilling decades of our experience running projects and project teams (link in profile).Also:#theater toots, bad #puns, #language hacks.Disclaimers:Boosts ≠ endorsement. Toots ≠ truths.