END-TO-END ENCRYPTION:
👎 APPLE <-> ANDROID
👍 APPLE <-> APPLE
👍 ANDROID <-> ANDROID
IS THIS ACCURATE #ASKNOSTR 🙏
END-TO-END ENCRYPTION:
👎 APPLE <-> ANDROID
👍 APPLE <-> APPLE
👍 ANDROID <-> ANDROID
IS THIS ACCURATE #ASKNOSTR 🙏
Sounds right.
No. Your phone encrypting something is not end-to-end. The phone is always a middleman.
BECAUSE YOU ENTER ON ONE DEVICE (NOT ENCRYPTED) SEND (MAYBE ENCRYPTED) RECEIVED (NOT ENCRYPTED) ON ANOTHER DEVICE. RIGHT?
Vulnerabilities get found in modern cell phones and computers and their operating systems all the time. They're a leaky "end," so you have "end plus leakpoints to end plus leakpoints encryption," not "end to end encryption"