END-TO-END ENCRYPTION:

👎 APPLE <-> ANDROID

👍 APPLE <-> APPLE

👍 ANDROID <-> ANDROID

IS THIS ACCURATE #ASKNOSTR 🙏

Reply to this note

Please Login to reply.

Discussion

Sounds right.

TRY SIMPLEX

LOVE SIMPLEX. SO FEW IN MY NETWORK ARNT ON IT YET 😞

No. Your phone encrypting something is not end-to-end. The phone is always a middleman.

BECAUSE YOU ENTER ON ONE DEVICE (NOT ENCRYPTED) SEND (MAYBE ENCRYPTED) RECEIVED (NOT ENCRYPTED) ON ANOTHER DEVICE. RIGHT?

Vulnerabilities get found in modern cell phones and computers and their operating systems all the time. They're a leaky "end," so you have "end plus leakpoints to end plus leakpoints encryption," not "end to end encryption"