TcToken feature provides APIs for issuing and managing trusted contact privacy tokens (TC tokens). These tokens are used for privacy-gated operations like sending messages and fetching profile pictures.
The library also supports cstoken (client-side token / NCT) as a fallback when no TC token exists for a recipient. This matches WhatsApp Web’s MsgCreateFanoutStanza.js behavior.
Token timing (bucket duration and count) is configurable via server-side AB props, with sensible defaults matching WhatsApp Web.
Access
Access TC token operations through the client:Methods
issue_tokens
Issue privacy tokens for specified contacts.jids- Array of JIDs (should be LID JIDs) to issue tokens for
Vec<ReceivedTcToken>- List of received tokens
Issued tokens are automatically stored in the backend and used for subsequent operations like message sending and profile picture fetching. Tokens are also automatically issued after sending a message when the current bucket has expired (see automatic usage).
prune_expired
Remove expired tokens from storage.- Number of tokens deleted
By default, tokens expire after 28 days (4 buckets × 7 days). The server may override this via AB props. Expired tokens are also automatically pruned on connect. Call this method if you need to trigger pruning manually.
get
Get a stored token for a specific JID.jid- User portion of the JID (without domain)
Option<TcTokenEntry>- The stored token entry, if found
get_all_jids
Get all JIDs that have stored tokens.- List of JID user portions with stored tokens
Types
ReceivedTcToken
Token received from the server.TcTokenEntry
Stored token entry.TcTokenConfig
Runtime-configurable timing for token expiration, sourced from server AB props.Automatic usage
The library automatically includes privacy tokens in outgoing 1:1 message stanzas using a fallback chain that matches WhatsApp Web:- tctoken — use the stored trusted contact token if it exists and hasn’t expired
- cstoken — compute an HMAC-SHA256 fallback using the NCT salt and recipient LID (for first-contact scenarios)
- No token — send without a token if neither is available (the server may return a 463 error)
AB prop gating
Token inclusion on message stanzas is gated by server-side AB props:PRIVACY_TOKEN_ON_ALL_1_ON_1_MESSAGES— controls whether tctoken/cstoken stanza children are attached to outgoing messagesNCT_TOKEN_SEND_ENABLED— controls whether the cstoken fallback is used when no tctoken is available
Post-send issuance
After sending a 1:1 message, the library checks whether a new token should be issued for the recipient. If the sender-side bucket has rolled over since the last issuance, a background IQ request issues a fresh token and stores the response. This matches WhatsApp Web’ssendTcToken behavior in MsgJob.js.
Identity change reissuance
When a contact reinstalls WhatsApp and their identity key changes, the library automatically re-issues TC tokens so the contact retains a valid privacy token. This matches WhatsApp Web’ssendTcTokenWhenDeviceIdentityChange behavior.
The reissuance is triggered when an UntrustedIdentity error is encountered during message decryption. After handling the identity change (clearing the old identity and retrying decryption), the client spawns a background task that:
- Checks if a token was previously issued to the sender (via
sender_timestamp) - Verifies the token hasn’t expired on the sender side
- Re-issues the token using the original issuance timestamp to preserve the bucket window
Token reissuance is skipped for bot JIDs and status broadcast senders. The operation is deduplicated via session locks to prevent concurrent reissuance for the same sender.
Incoming token notifications
When a contact sends you a privacy token, the library handles it automatically:- Parses the
<notification type="privacy_token">stanza - Resolves the sender to a LID for storage (using
sender_lidattribute or LID-PN cache) - Applies a timestamp monotonicity guard — older tokens don’t overwrite newer ones
- Stores the token in the backend
- Re-subscribes presence for the sender to pick up the updated token
Startup pruning
Expired tokens are automatically pruned when the client connects, matching WhatsApp Web’sPrivacyTokenJob.
Skipped recipients
Tokens are not sent to:- Your own JID
- Bot JIDs
- Status broadcast
- Pre-issuing tokens for a batch of contacts
- Debugging token-related issues
cstoken (NCT fallback)
When no valid TC token exists for a recipient, the library falls back to a cstoken (client-side token). This is computed using an NCT salt that is provisioned by the server via app state sync.How it works
- The server provides an NCT salt through the
nct_salt_syncapp state mutation (or via history sync during initial pairing) - The salt is stored in the
Devicestruct asnct_salt - When sending a message to a recipient with no stored TC token, the library computes
HMAC-SHA256(nct_salt, recipient_lid)and includes it as a<cstoken>stanza child
Wire format
NCT salt provisioning
The NCT salt is delivered through two channels:- App state sync — The
nct_salt_syncmutation in theRegularHighsyncd collection sets or removes the salt. This is the authoritative source. - History sync — During initial pairing, the salt may be included in the history sync payload. This is a backfill-only source and won’t overwrite a salt already set via app state sync.
The cstoken fallback is fully automatic. You don’t need to manage the NCT salt or compute tokens manually. The library handles salt storage, LID resolution, and token computation transparently during message sending.
Token lifecycle
Expiration
TC token expiration uses a bucket-aligned system. By default, tokens expire after 28 days (4 buckets × 7-day duration). The server can override these defaults via AB props:| AB prop | Default | Description |
|---|---|---|
tctoken_duration | 604800 (7 days) | Receiver-side bucket duration in seconds |
tctoken_num_buckets | 4 | Number of receiver-side buckets |
tctoken_duration_sender | 604800 (7 days) | Sender-side bucket duration in seconds |
tctoken_num_buckets_sender | 4 | Number of sender-side buckets |
tokenExpirationCutoff logic.
Best practices
- Pre-issue tokens for contacts you frequently interact with
- Don’t over-issue — tokens are automatically issued after each message send when the bucket rolls over
- Use LID JIDs when issuing tokens manually
- Let startup pruning handle cleanup — expired tokens are pruned automatically on connect