Facebook’s Secret Competitive Weapon: Deciphering Snapchat Traffic


In an eye-opening revelation from the tech world, court documents unsealed this week have cast a new light on Facebook’s shadowy endeavors to outmaneuver its competition. Dubbed “Project Ghostbusters,” the initiative saw Facebook ingeniously, albeit controversially, intercept and decrypt network traffic between Snapchat users and its servers. The aim was straightforward: dissect user behavior on Snapchat to sharpen Facebook’s competitive edge.

The details emerged from a class action lawsuit against Meta, Facebook’s rebranded parent company, highlighting a broader strategy to dominate rivals. Beyond Snapchat, Facebook later extended its surveillance to include Amazon and YouTube, employing sophisticated means to circumvent encryption and scrutinize how users interacted with these platforms.

Central to Project Ghostbusters was a technique developed under Facebook’s In-App Action Panel (IAPP) program, capable of “intercepting and decrypting” encrypted app traffic. This initiative wasn’t without its internal detractors. Prominent voices within the company, including Jay Parikh, then-head of infrastructure engineering, and Pedro Canahuati, then-head of security engineering, voiced ethical concerns, questioning the morality of such invasive tactics.

Meta’s method of choice for this operation was Onavo, a VPN-like service acquired in 2013, which came under fire and was shut down in 2019 following revelations that it enabled Facebook to monitor all web activity of its users, including teenagers.

Despite the ingenious technical prowess displayed, Project Ghostbusters raises significant privacy concerns and ethical questions about the lengths to which companies will go to maintain their market dominance. As the lawsuit progresses, the tech community and consumers alike will be watching closely, perhaps reevaluating the trust they place in their favorite apps and services.

This story is a developing one, and reactions from the companies involved are still forthcoming. In the meantime, those with insider knowledge are encouraged to come forward, promising further revelations about the secretive tactics employed in the tech industry’s cutthroat competitive landscape.

We earn commissions using affiliate links.


14 Privacy Tools You Should Have

Learn how to stay safe online in this free 34-page eBook.


Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top