WhatApp Chats as Evidence in Indian Courts: Why “Delete for Everyone” and End-to-End Encryption Don’t Protect You

Our readers already know that WhatsApp chats qualify as electronic evidence. The courts require a certificate under Section 65B of the Indian Evidence Act, 1872 (now Section 63 of the Bharatiya Nyaya Sanhita, 2023) in most cases. Further, landmark judgments by the Supreme Court in Anvar PV (2014) and Arjun Panditrao Khotkar (2020) govern the admissibility of electronic evidence. To develop a basic understanding of this subject, you can refer to Sammed Akiwate’s widely read 2020 article on our blog.
However, five years later, we have three burning questions that the previous article could only hint at, but dominate every courtroom discussion:
- Does WhatsApp’s end-to-end encryption (E2EE) actually protect your chats once the police or a spouse seize your phone?
- Can investigators still recover messages even after you hit “Delete for Everyone”?
- Do Indian courts really accept private chats obtained without the other person’s consent or even without strictly following the law?
The answer to all three, as many recent judgments show, is a clear and resounding no to privacy, and yes to admissibility. This article reveals exactly what happens and how.
End-to-End Encryption Stops at Your Phone’s Screen
WhatsApp proudly repeats that E2EE makes messages unreadable to anyone other than the sender and recipient. This feature is operationally pointless because E2EE only protects messages while they travel between phones. The moment someone holds your device, or your chat partner’s device, encryption in this context becomes completely irrelevant.
Police seize thousands of mobile devices every year under Sections 106 and 94 of the Bharatiya Nagarik Suraksha Sanhita, 2023 (previously Sections 102 and 91/94 of the Code of Criminal Procedure, 1973, respectively), and Section 50 of the Narcotic Drugs and Psychotropic Substances Act, 1985. Officers then ask (or compel) the device owner to unlock the device using fingerprint, face ID, or passcode. However, the police cannot threaten, coerce, or order an accused person to reveal passwords, unlock devices, or provide encryption keys. Once the screen lights up, investigators open WhatsApp and read everything in plain text. Moreover, they take screenshots, export chats, and create forensic images. Consequently, agencies never need WhatsApp/Meta to break encryption; they can simply bypass it at the endpoint.
High-profile cases repeatedly illustrate this reality. For example, in the 2021 Aryan Khan drug case, NCB officers directly extracted chats from seized phones. Similarly, in the 2024 Pune Porsche crash cover-up, the police recovered planning messages from the minor’s father’s phone within hours. Additionally, the 2025 NEET paper-leak investigations relied entirely on chats pulled straight from accused teachers’ and students’ devices. Notably, a small sense of relief is knowing that WhatsApp has never handed over a single message to Indian authorities, as E2EE prevents server-side access.
Furthermore, spouses exploit the same endpoint weakness in matrimonial proceedings. A partner can quietly note the passcode, open the phone at night, and take screenshots of years of conversations. Courts routinely admit these screenshots because relevance trumps privacy concerns. Though it can raise civil liability for unauthorised access to a computer resource, and, if done fraudulently or dishonestly, it can also invoke criminal liability under the Information Technology Act, 2000.
Hence, evidence may be illegally obtained and be procedurally admissible, but does not grant immunity from a civil suit or criminal prosecution. Therefore, encryption can protect you from hackers and governments spying on the air. However, it offers zero protection against anyone who physically (or legally) holds the phone. In short, E2EE stops exactly where your mobile phone’s screen starts.
“Delete for Everyone” Means Nothing to Forensic Experts
Users celebrate when they tap “Delete for Everyone” and watch incriminating messages vanish with the reassuring note “This message was deleted,” thinking that they have actually deleted the history. However, forensic experts treat that feature as a minor inconvenience rather than a genuine protection. The truth is that the message disappears from the chat window. Yet, the data remains stored in WhatsApp’s internal SQLite database files (primarily msgstore.db) on both phones until new data overwrites them.
Forensic Science Laboratories routinely recover thousands of these “deleted” messages every month. Forensic investigators create a complete logical or physical image of the seized device using tools such as Cellebrite UFED, Oxygen Forensic Detective, or Magnet AXIOM, and then extract the entire WhatsApp database. Consequently, messages deleted weeks, months, or even years earlier reappear with original timestamps, sender details, and blue-tick read receipts intact.
Moreover, courts accept these recovered chats without hesitation. In the 2024 Elvish Yadav snake-venom case, NCB submitted over 400 deleted messages that proved payment and delivery arrangements. Similarly, in the 2025 NEET paper-leak scandal, CBI recovered deleted coordination chats from multiple devices, leading to fresh arrests. Additionally, the Sidhu Moosewala murder investigation also relied heavily on recovered “deleted for everyone” threats and planning discussions.
Notably, even disappearing messages (24-hour or 7-day auto-delete) and View Once photos leave recoverable traces before the app purges them. Forensic tools capture the database before the scheduled wipe or restore from earlier backups. Therefore, success rates exceed 80% when police seize a device within six months of deletion. In family courts, spouses frequently produce hundreds of recovered deleted chats to prove cruelty, adultery, or dowry demands. Section 14 of the Family Courts Act, 1984, allows their admission, as relevance outweighs technical deletion.
It is important to note that Modern Android (Android 7+) and iOS devices use File-Based Encryption, not full-disk encryption. When a device is in a Before-First-Unlock state, logical, physical, or database extraction is cryptographically impossible, rendering forensic access wholly dependent on user cooperation. As a result, any investigative direction compelling disclosure of passcode amounts is not for the facilitation of search, but rather for a testimonial self-incrimination.
Ultimately, “Delete for Everyone” only removes visibility for casual viewers. Forensic experts, armed with the right tools and a seized phone, bring every word back to life. And Indian courts happily place those resurrected messages on record.
The Play of Section 14 of the Family Courts Act, 1984
Indian courts admit WhatsApp chats even when one party obtains them without consent. Moreover, at least in family court proceedings, judges increasingly rule that relevance trumps privacy. Section 14 gives judges sweeping powers. This section explicitly states that family courts shall not be bound by the strict rules of evidence. As a result, hundreds of reported judgments from high courts across the country uphold the admissibility of non-consensual WhatsApp evidence. For instance, in June 2025, the Madhya Pradesh High Court allowed chats forwarded through a hidden app to be admitted as evidence, while stating that “The manner of procurement pales before the need to discover truth in matrimonial cruelty.”
Therefore, disputes between spouses now hinge on chats that one spouse never agreed to share. While Section 14 confers procedural latitude in receiving evidence, such discretion must operate within constitutional limits. Accordingly, family courts have a constitutional obligation to assess not merely the relevance of digital evidence, but also the proportionality and legality of its acquisition, lest Section 14 be reduced to an instrument that legitimises privacy violations under the guise of truth-finding. Family courts should only admit narrowly relevant extracts and redacted data, and exclude fishing expeditions and bulk data dumps. This is how Section 14 survives constitutional scrutiny.
In criminal and civil cases outside family courts, the trend follows the same logic, though stricter certificate rules sometimes apply. However, in matrimonial disputes where emotions run the highest, consent has almost become meaningless. Your private chats stay private only until the person you trusted most decides to present them in court.
Blue Ticks, Timestamps and Metadata
Read receipts (“blue ticks”) function as circumstantial evidence of the recipient’s knowledge and timing of receipt. When a recipient reads a threat, demand, or confession, those two blue marks stamp the exact second of knowledge. Moreover, courts can consider blue ticks as iron-clad circumstantial evidence. Timstamps and “forwarded” labels add another lethal layer. Courts have seen a message forwarded multiple times, with its original timestamps, as proof of a broader conspiracy. Additionally, metadata reveals device IDs, location tags (if enabled), and even edit history. Forensic investigators can effortlessly extract this data.
Consequently, defendants who claim “I never saw it” or “someone else used my phone” crumble the moment blue ticks appear at 2:17AM, even though the phone remained stationary at home. These tiny labels and numbers often speak louder than any witness, and they never lie.
Conclusion
In this article, we have discussed multiple real-life examples that tell you your WhatsApp chats stay private only until someone you trust hands over the phone. So, choose every chat and confidant with extreme care. At the same time, we need to understand that marriage does not dilute informational privacy, nor can procedural flexibility be used to override the prohibition against testimonial self-incrimination. Family courts may receive WhatsApp evidence, but they cannot compel its creation.
