BECAUSE YOU ENTER ON ONE DEVICE (NOT ENCRYPTED) SEND (MAYBE ENCRYPTED) RECEIVED (NOT ENCRYPTED) ON ANOTHER DEVICE. RIGHT?

Reply to this note

Please Login to reply.

Discussion

Vulnerabilities get found in modern cell phones and computers and their operating systems all the time. They're a leaky "end," so you have "end plus leakpoints to end plus leakpoints encryption," not "end to end encryption"