Submitted by [deleted] t3_125wf75 in explainlikeimfive
billdietrich1 t1_je99asr wrote
They mean that encryption/decryption takes place on the source and destination devices, so in theory the servers and attackers in the middle can't read the traffic.
In practice, whoever holds and applies the keys can read the traffic. So if your end device is using code from the server to do this, potentially the server could give you malicious code and read your traffic. The solution is to have the encryption and the storage/transport done by different companies or projects. Use an encryption package such as PGP or Mailvelope, and then a service such as normal email.
Viewing a single comment thread. View all comments