This is false. There is still plenty of metadata that centralized providers can capture and turn over and that is usually sufficient for law-enforcement to get the information they want.
You seem to be highly misinformed what metadata is. A server for example will always have access to unencrypted IP addresses from the clients connecting to it, this is impossible to avoid unless you use a service like Tor that relays internet traffic, but that has very little to do with “encryption”.
Another thing a server can easily access is the timestamp of messages. Even if that is somehow stored encrypted in the server, messages are sent in real time and the server can easily log those, so an e2e encryption chat service will at the very least have logs with IP and timestamps. This can’t really be avoided.
It never was encrypted. If it was they wouldn’t have anything to turn over.
This is false. There is still plenty of metadata that centralized providers can capture and turn over and that is usually sufficient for law-enforcement to get the information they want.
Right, WhatsApp is encrypted but not private at all. Reason? Metadatas, says as much as the message
This is false. They cannot turn over any type of data that is encrypted. Metadata or otherwise. That’s the point of encryption.
Except that most of the metadata isn’t encrypted anywhere and usually also can’t be encrypted as otherwise the service wouldn’t be able to function.
Plenty of services encrypt metadata. You need to do more research.
You seem to be highly misinformed what metadata is. A server for example will always have access to unencrypted IP addresses from the clients connecting to it, this is impossible to avoid unless you use a service like Tor that relays internet traffic, but that has very little to do with “encryption”.
Another thing a server can easily access is the timestamp of messages. Even if that is somehow stored encrypted in the server, messages are sent in real time and the server can easily log those, so an e2e encryption chat service will at the very least have logs with IP and timestamps. This can’t really be avoided.