• Bronstein_Tardigrade@lemmygrad.ml
    link
    fedilink
    arrow-up
    6
    ·
    2 days ago

    Shows that the only true end to end encryption is when the sender and recipient do the encrypting/decrypting locally. Even then, it requires both ends not to be compromised.