{"id":2325,"date":"2026-04-06T20:03:52","date_gmt":"2026-04-06T20:03:52","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/"},"modified":"2026-04-06T20:03:52","modified_gmt":"2026-04-06T20:03:52","slug":"new-mexicos-meta-ruling-and-encryption","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/","title":{"rendered":"New Mexico\u2019s Meta Ruling and Encryption"},"content":{"rendered":"<div>\n<p>Mike Masnick <a href=\"https:\/\/www.techdirt.com\/2026\/03\/26\/everyone-cheering-the-social-media-addiction-verdicts-against-meta-should-understand-what-theyre-actually-cheering-for\/\">points out <\/a> that the recent New Mexico court ruling against Meta has some bad implications for end-to-end encryption, and security in general:<\/p>\n<blockquote>\n<p>If the \u201cdesign choices create liability\u201d framework seems worrying in the abstract, the New Mexico case provides a concrete example of where it leads in practice.<\/p>\n<p>One of the key pieces of evidence the New Mexico attorney general used against Meta was the company\u2019s 2023 decision to add end-to-end encryption to Facebook Messenger. The argument went like this: predators used Messenger to groom minors and exchange child sexual abuse material. By encrypting those messages, Meta made it harder for law enforcement to access evidence of those crimes. Therefore, the encryption was a design choice that enabled harm.<\/p>\n<p>The state is now seeking court-mandated changes including \u201cprotecting minors from encrypted communications that shield bad actors.\u201d<\/p>\n<p>Yes, the end result of the New Mexico ruling might be that Meta is ordered to make everyone\u2019s communications less secure. That should be terrifying to everyone. Even those cheering on the verdict.<\/p>\n<p>End-to-end encryption protects billions of people from surveillance, data breaches, authoritarian governments, stalkers, and domestic abusers. It\u2019s one of the most important privacy and security tools ordinary people have. Every major security expert and civil liberties organization in the world has argued for stronger encryption, not weaker.<\/p>\n<p>But under the \u201cdesign liability\u201d theory, implementing encryption becomes evidence of negligence, because a small number of bad actors also use encrypted communications. The logic applies to literally every communication tool ever invented. Predators also use the postal service, telephones, and in-person conversation. The encryption <i>itself<\/i> harms no one. Like infinite scroll and autoplay, it is inert without the choices of bad actors \u00ad- choices made by <i>people,<\/i> not by the platform\u2019s design.<\/p>\n<p>The incentive this creates goes far beyond encryption, and it\u2019s bad. If any product improvement that protects the majority of users can be held against you because a tiny fraction of bad actors exploit it, companies will simply stop making those improvements. Why add encryption if it becomes Exhibit A in a future lawsuit? Why implement any privacy-protective feature if a plaintiff\u2019s lawyer will characterize it as \u201cshielding bad actors\u201d?<\/p>\n<p>And it gets worse. Some of the most damaging evidence in both trials came from internal company documents where employees raised concerns about safety risks and discussed tradeoffs. These were played up in the media (and the courtroom) as \u201csmoking guns.\u201d But that means no company is going to allow anyone to raise concerns ever again. That\u2019s very, very bad.<\/p>\n<p>In a sane legal environment, you <i>want<\/i> companies to have these internal debates. You want engineers and safety teams to flag potential risks, wrestle with difficult tradeoffs, and document their reasoning. But when those good-faith deliberations become plaintiff\u2019s exhibits presented to a jury as proof that \u201cthey knew and did it anyway,\u201d the rational corporate response is to stop putting anything in writing. Stop doing risk assessments. Stop asking hard questions internally.<\/p>\n<p>The lesson every general counsel in Silicon Valley is learning right now: ignorance is safer than inquiry. That makes everyone less safe, not more.<\/p>\n<\/blockquote>\n<p>The essay has a lot more: about Section 230, about competition in this space, about the myopic nature of the ruling. Go <a href=\"https:\/\/www.techdirt.com\/2026\/03\/26\/everyone-cheering-the-social-media-addiction-verdicts-against-meta-should-understand-what-theyre-actually-cheering-for\/\">read it<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Mike Masnick points out that the recent New Mexico court ruling against Meta has some bad implications for end-to-end encryption, and security in general: If the \u201cdesign choices create liability\u201d framework seems worrying in the abstract, the New Mexico case provides a concrete example of where it leads in practice. One of the key pieces [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[955,510,90,291,345,458,53],"tags":[91],"class_list":["post-2325","post","type-post","status-publish","format-standard","hentry","category-children","category-courts","category-cybersecurity","category-encryption","category-meta","category-social-media","category-uncategorized","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Mexico\u2019s Meta Ruling and Encryption - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Mexico\u2019s Meta Ruling and Encryption - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Mike Masnick points out that the recent New Mexico court ruling against Meta has some bad implications for end-to-end encryption, and security in general: If the \u201cdesign choices create liability\u201d framework seems worrying in the abstract, the New Mexico case provides a concrete example of where it leads in practice. One of the key pieces [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-06T20:03:52+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"New Mexico\u2019s Meta Ruling and Encryption\",\"datePublished\":\"2026-04-06T20:03:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/\"},\"wordCount\":554,\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"children\",\"courts\",\"Cybersecurity\",\"encryption\",\"meta\",\"Social Media\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/\",\"name\":\"New Mexico\u2019s Meta Ruling and Encryption - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-04-06T20:03:52+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Mexico\u2019s Meta Ruling and Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Mexico\u2019s Meta Ruling and Encryption - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/","og_locale":"en_US","og_type":"article","og_title":"New Mexico\u2019s Meta Ruling and Encryption - Imperative Business Ventures Limited","og_description":"Mike Masnick points out that the recent New Mexico court ruling against Meta has some bad implications for end-to-end encryption, and security in general: If the \u201cdesign choices create liability\u201d framework seems worrying in the abstract, the New Mexico case provides a concrete example of where it leads in practice. One of the key pieces [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-04-06T20:03:52+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"New Mexico\u2019s Meta Ruling and Encryption","datePublished":"2026-04-06T20:03:52+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/"},"wordCount":554,"keywords":["Cybersecurity"],"articleSection":["children","courts","Cybersecurity","encryption","meta","Social Media"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/","name":"New Mexico\u2019s Meta Ruling and Encryption - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-04-06T20:03:52+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/06\/new-mexicos-meta-ruling-and-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"New Mexico\u2019s Meta Ruling and Encryption"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2325"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2325\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}