schizoidman@lemmy.zip to Privacy@lemmy.mlEnglish · 6 months agoAustrian government agrees on plan to allow monitoring of secure messagingwww.reuters.comexternal-linkmessage-square12fedilinkarrow-up162arrow-down10file-text
arrow-up162arrow-down1external-linkAustrian government agrees on plan to allow monitoring of secure messagingwww.reuters.comschizoidman@lemmy.zip to Privacy@lemmy.mlEnglish · 6 months agomessage-square12fedilinkfile-text
minus-squareUlrich@feddit.orglinkfedilinkEnglisharrow-up2arrow-down1·6 months agoE2EE comms are not monitorable. That’s like, the whole purpose of using them.
minus-squaresunzu2@thebrainbin.orglinkfedilinkarrow-up3arrow-down1·edit-22 months agodeleted by creator
minus-squareslackness@lemmy.mllinkfedilinkarrow-up8·6 months agoCan you really talk about E2EE on a closed source app? The whole point of E2EE is I don’t trust the vendor. If they give me a blob as a client and tell me it’s E2EE, am I supposed to just trust them all of a sudden?
minus-squarebndkt@lemm.eelinkfedilinkEnglisharrow-up2·6 months agoYou just have to infiltrate one end, e.g. the smartphone of one party
E2EE comms are not monitorable. That’s like, the whole purpose of using them.
deleted by creator
Can you really talk about E2EE on a closed source app? The whole point of E2EE is I don’t trust the vendor. If they give me a blob as a client and tell me it’s E2EE, am I supposed to just trust them all of a sudden?
Zucc shares the info
You just have to infiltrate one end, e.g. the smartphone of one party