BECAUSE YOU ENTER ON ONE DEVICE (NOT ENCRYPTED) SEND (MAYBE ENCRYPTED) RECEIVED (NOT ENCRYPTED) ON ANOTHER DEVICE. RIGHT?
Discussion
Vulnerabilities get found in modern cell phones and computers and their operating systems all the time. They're a leaky "end," so you have "end plus leakpoints to end plus leakpoints encryption," not "end to end encryption"