No. Your phone encrypting something is not end-to-end. The phone is always a middleman.

Reply to this note

Please Login to reply.

Discussion

BECAUSE YOU ENTER ON ONE DEVICE (NOT ENCRYPTED) SEND (MAYBE ENCRYPTED) RECEIVED (NOT ENCRYPTED) ON ANOTHER DEVICE. RIGHT?

Vulnerabilities get found in modern cell phones and computers and their operating systems all the time. They're a leaky "end," so you have "end plus leakpoints to end plus leakpoints encryption," not "end to end encryption"