KoaichJoin waitlist
← All explainers

Forward secrecy in plain English

Forward secrecy means a key compromised tomorrow can't read messages from yesterday. It's a property most workspace tools don't have. Here's what it is, why it matters, and how groups achieve it.

IN PLAIN ENGLISH
Imagine the lock on your office door. If someone steals today's key, they can open every drawer you've ever locked — including drawers from ten years ago. That's how most workspace tools work: one key opens everything you've ever stored. Forward secrecy is the opposite — every day uses a new key, and stealing today's key gives you nothing from yesterday. Koaich's group rooms work this way; most workspace tools don't.

Forward secrecy is the property that a key compromised today cannot read messages from before today. It sounds like a technicality. It's the difference between a single bad day costing you one conversation and costing you everything you've ever sent.

The intuition

Imagine you use the same physical key to lock every drawer in your office. If someone steals that key, they can open every drawer — including every drawer you'd already locked yesterday, last year, ten years ago. Your past is as exposed as your present.

Now imagine the lock rotates every day. Today's key opens today's drawer; tomorrow's key opens tomorrow's. If someone steals tomorrow's key, they can't go back and open yesterday's. Each day's data is sealed under that day's key alone, and the keys aren't connected.

That's forward secrecy. The key for any given moment in time doesn't unlock the past.

Why most workspace tools don't have it

Forward secrecy requires deriving fresh keys frequently — every message, or every group membership change, or at minimum every session. That's work the workspace tool would have to do continuously, and it complicates almost every server-side feature (search, AI, support). Most tools chose features.

The visible consequence: a vendor breach that exposes server-side keys exposes not just future messages but the entire archive. The blast radius of a breach is everything stored to date.

Signal popularized forward secrecy in mainstream messaging through its Double Ratchet design — a fresh key per message, derived in a way the previous key can't reconstruct. The price is complexity. The payoff is that a stolen key today doesn't decrypt yesterday's messages even if the vendor wanted to help.

Group rooms are harder

Forward secrecy for one-on-one messaging was the easier problem. For groups — a marketing team channel, a board room, a matter team, a family thread — the math gets harder, because every member needs to derive the same key to read the same message, and the key needs to roll forward through changes in membership.

The IETF's Messaging Layer Security (MLS) protocol — published as RFC 9420 in 2023 — solved this. MLS gives groups three properties simultaneously: every member can derive the current key, every membership change rolls the key forward (so past members lose access to future messages), and a member whose key is compromised can be moved past in the ratchet (so the compromise doesn't permanently follow the group).

Koaich uses MLS for group rooms. See What's MLS and why does it matter for workspace privacy for the deeper version.

What this looks like in practice

A contractor joins your team for a project. You add them to the matter room. They can read messages from the moment they joined — not before. Their device has the post-join group key but not the pre-join one.

The project ends. You remove them. They can read messages up to the moment they left — not after. The group key rolls forward on removal; their device has the pre-removal key but not the post-removal one.

If their device is later compromised — phone stolen, malware installed, ex-employee acting in bad faith — the attacker can decrypt the slice of conversation that contractor was in. They can't decrypt the time before they joined or after they left. The exposure is scoped exactly to what their access genuinely was.

Most workspace tools — Slack, Notion, Teams, Google Workspace — don't have this property. A leaked workspace key, an over-permissioned admin account, an old session token can reach the full archive. The blast radius is everything.

Frequently asked questions

What is forward secrecy?

Forward secrecy is the cryptographic property that a key compromised at any moment cannot decrypt messages from before that moment. Each message (or each session) is sealed under a fresh key derived in a way that can't be reconstructed from later state.

Why does forward secrecy matter?

Without forward secrecy, a single key compromise — through breach, subpoena, or insider abuse — exposes the entire message archive that key ever touched. With forward secrecy, the same compromise exposes only the small window of messages encrypted under the compromised key.

Does Slack have forward secrecy?

No. Slack's encryption-at-rest uses long-lived keys that the vendor holds. A compromise of those keys (breach, legal demand, insider) gives access to the entire stored message archive, not just future messages.

Does WhatsApp have forward secrecy?

WhatsApp uses the Signal Protocol for end-to-end encryption with the Double Ratchet algorithm, which provides forward secrecy for messages in transit. However, WhatsApp backups (iCloud, Google Drive) historically did not preserve forward secrecy — backup encryption was an opt-in feature added later.

Keep reading

Workspace privacy, by default.

Get on the Koaich waitlist.

Pre-launch · No spam · Unsubscribe anytime