Remix.run Logo
zappb 2 days ago

People usually mean "end to end encryption" in these situations, and by adding a third "end" to the system, you bypass the whole point of end to end encryption.

gjsman-1000 2 days ago | parent [-]

My above example is end to end encryption compatible, it's just that you don't get to pick the end it might go to. However, the connections between ends are still encrypted. As such, it passes the technical mathematical definition (one end having a direct pipe to the second end, with nothing possibly in between), but not the philosophical one.

Governments have never cared about the encryption philosophy; only the math aspects and international risk - which, in this example, are technically satisfied.