911是什么电话| 病毒性扁桃体发炎吃什么药| 哈伦裤配什么鞋子好看| 虚荣心是什么意思| 带状疱疹不能吃什么食物| 男人吃女人有什么好处| 匹维溴铵片治什么病| 8月10日是什么星座| 凭什么姐| 在什么| 农历十月初五是什么星座| 尿酸低是什么原因| 什么情况下吃丹参滴丸| 头发变黄是什么原因| 酒糟鼻子是什么原因引起的| 三和大神是什么意思| 喉咙痛吃什么药好得最快| 咳嗽变异性哮喘吃什么药| 为什么腰痛| 口腔溃疡吃什么水果好| 表白送什么礼物好| 金刚石是由什么构成的| 海拔是什么| mr是什么检查项目| 芭乐是什么水果| 去医院测血糖挂什么科| 画饼什么意思| 胃穿孔是什么原因引起的| 月经不能吃什么东西| 心内科全称叫什么| 网店卖什么好| 8月6号是什么星座| 颈椎病吃什么药最好| 一月23号是什么星座| 什么是针灸| 应无所住而生其心是什么意思| 日语莫西莫西什么意思| 经血颜色淡是什么原因| 知青是什么| 什么是挠脚心| as医学上是什么意思| 多发性硬化是什么病| 阿托伐他汀治什么病| er是什么意思| 达英35是什么药| 荷兰豆为什么叫荷兰豆| 转网是什么意思| 诸葛亮长什么样| 猴与什么属相相配最好| 什么是二级医院| pinsp呼吸机代表什么| ph是什么意思| 肝脏排毒吃什么最好| 麦芽是什么| 洗衣机启动不了是什么原因| 炖排骨放什么调料| 麻了是什么意思| 强肉弱食是什么意思| 阿胶烊化是什么意思| 哀莫大于心死什么意思| 头发突然秃了一块是什么原因| 性无能是什么意思| 脑门发黑是什么原因| 海瓜子是什么| 婴儿肥是什么意思| os是什么| 术后吃什么补元气| 淋巴结肿大是什么原因| 什么原因造成低血糖| 小丑代表什么生肖| 复古是什么意思| 凤凰男是什么意思| 桂花代表什么生肖| 高中什么时候分文理科| 吃饭掉筷子有什么预兆| 刺五加配什么药治失眠| 福星高照是什么生肖| 保胎是什么意思| 姐妹是什么生肖| 什么叫脑白质病| 指甲上的月牙代表什么| 肚脐眼连着什么器官| 文火是什么意思| 牛魔王是什么生肖| 吃什么长高| 1月10号是什么星座| 天麻有什么作用| 35岁月经量少是什么原因| 什么是坚果| 自制力是什么意思| 爽是什么结构| 鸡胗是什么| 什么叫静息心率| 妇女是什么意思| 牙龈发炎吃什么消炎药| 胃疼看病挂什么科| 腰椎疼痛是什么原因| 世界上最毒的蜘蛛叫什么| 在编是什么意思| 渣滓是什么意思| 忠于自己是什么意思| 花白鲢喂养什么长得快| 血脂稠是什么原因造成的| 例假是什么意思| 耳洞发炎流脓用什么药| 母亲节送婆婆什么礼物| 耳朵嗡嗡响是什么原因| 沾沾喜气什么意思| 米氮平是什么药| 有机什么意思| 灰水是什么| 一年一片避孕药叫什么| 转折是什么意思| 拔罐拔出水是什么原因| 专科警校出来干什么| cvt是什么意思| 黄水疮是什么原因引起的| 什么水果含铁量最高| 为什么要拔智齿| 头发白缺什么| 回忆杀是什么意思| 什么是直流电| 为什么过敏反复发作| 高铁和地铁有什么区别| 血小板减少是什么原因| 男人喝什么茶壮阳| 蚊子代表什么生肖| 奶茶和奶绿有什么区别| 什么头什么耳| 修心是什么意思| 高中学考是什么意思| 长脸型适合什么样的发型女| 吃华法林不能吃什么| 螺蛳粉为什么臭| 早上起床腰疼是什么原因| 黄瓜有什么营养| 梦见很多苍蝇是什么意思| 属虎生什么属相宝宝好| 奶奶的妈妈应该叫什么| 鸡蛋清敷脸有什么好处和坏处| 什么是辐照食品| 什么除湿气效果最好| 胖次是什么意思| 22度穿什么衣服合适| 吃什么对肺最好| 孕妇适合吃什么食物| 吃什么去肝火效果最好| hz是什么意思| 军校出来是什么军衔| 5月出生是什么星座| 花生不能和什么食物一起吃| 经常吃生花生有什么好处和坏处| 中国最大的海是什么海| 口吐白沫是什么病| 倒挂金钩是什么意思| 什么叫粳米| 腈纶是什么面料| 拉屎的时候拉出血来是什么原因| 医保定点医院是什么意思| 为什么叫马路| 人为什么会有头皮屑| 肌钙蛋白高是什么意思| 什么叫心悸| 一个丝一个鸟读什么| 人为什么会长痔疮| 无事不登三宝殿什么意思| 涵字五行属什么| 晚上九点半是什么时辰| 紫外线过敏吃什么药| 站着腰疼是什么原因引起的| 颈椎痛吃什么药最好| 人性是什么| 扁桃体有什么用| 上午十点半是什么时辰| 离婚要带什么| 附件是什么| 低压高吃什么降压药好| 6月5号是什么星座| est什么意思| 为什么会阑尾炎| 什么是乐高| 膈应是什么意思| 你什么我什么| 什么症状吃藿香清胃胶囊| 芦荟有什么功效| 甘草是什么| 煜字五行属什么| 梦见种地是什么意思| 梦到和别人打架是什么意思| 知己什么意思| 老花眼视力模糊有什么办法解决吗| 甲亢病有什么症状| 乌江鱼是什么鱼| 倒拔垂杨柳是什么意思| 属虎的五行属什么| 盆腔炎吃什么| 农历闰月有什么规律| 右肺中叶少许纤维灶是什么意思| 检查妇科清洁度三是什么意思| 绿茶属于什么茶| 嗓子发炎吃什么| 小孩上户口需要什么材料| 嘴唇下面长痘痘是什么原因| 读书与吃药是什么生肖| 感冒能吃什么| 氨咖黄敏胶囊是治什么的| 正山小种属于什么茶| 舌炎吃什么药最好| 尪痹是什么意思| 胃胀嗳气吃什么药最有效| 什么叫腺肌瘤| 什么是爱情观| 共度良宵是什么意思| 直肠癌是什么症状| 58年属狗是什么命| 救济的近义词是什么| 我一言难尽忍不住伤心是什么歌| 氯丙嗪是什么药| 儿童尿频什么原因引起的| 梵行是什么意思| 高血压为什么不能献血| 胃炎吃什么药效果好| 疝气是什么意思| 煤油对人体有什么危害| 明眸皓齿是什么意思| 贵人命是什么意思| com什么意思| 嘴巴苦是什么原因| 拔牙后能吃什么东西| 银杏属于什么植物| 肾炎是什么病| 母鸡什么意思| 里急后重什么意思| 什么叫心律不齐| 鱼疗是什么鱼| 庚子是什么时辰| 梦见自己洗澡是什么意思| 下水道井盖为什么是圆的| 舌尖有裂纹是什么原因| 心动过缓吃什么药最好| 蒲公英叶和根的功效有什么不同| 不可以加什么偏旁| skin是什么意思| 无利不起早是什么意思| 吃什么容易怀孕| 长白头发了吃什么才能把头发变黑| 见什么知什么| 化疗和靶向有什么区别| 10月9号是什么星座| 血竭是什么东西| 上半身皮肤痒什么原因| 什么是癌胚抗原| 舌头有黑点是什么原因| 小米粥和什么搭配最好最养胃| 肝内脂肪浸润是什么意思| 再创佳绩是什么意思| 阻生齿是什么| 一什么笑声| 口舌麻木吃什么药| 吃什么可以生发| 险象环生是什么意思| 什么是电子版照片| 窦骁父母是干什么的| 血稠有什么症状| 百度Jump to content

From Wikipedia, the free encyclopedia
Under end-to-end encryption, no third parties like platforms and service providers can decrypt messages, dramatically reducing attack surface.
百度 例如,现在山东、海南都设有海洋与渔业厅,国家部委并未有这个机构。

End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including the system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to read or send messages.[1]

End-to-end encryption prevents data from being read or secretly modified, except by the sender and intended recipients. In many applications, messages are relayed from a sender to some recipients by a service provider. In an E2EE-enabled service, messages are encrypted on the sender's device such that no third party, including the service provider, has the means to decrypt them. The recipients retrieve encrypted messages and decrypt them independently on their own devices. Since third parties cannot decrypt the data being communicated or stored, services with E2EE are better at protecting user data from data breaches and espionage.[2][3]

Computer security experts,[4] digital freedom organizations,[5] and human rights activists[6] advocate for the use of E2EE due to its security and privacy benefits, including its ability to resist mass surveillance.[7] Popular messaging apps like WhatsApp, iMessage, Facebook Messenger, and Signal use end-to-end encryption for chat messages, with some also supporting E2EE of voice and video calls. As of May 2025, WhatsApp is the most widely used E2EE messaging service, with over 3 billion users.[8] Meanwhile, Signal with an estimated 70 million users,[9] is regarded as the current gold standard in secure messaging by cryptographers, protestors, and journalists.[10][11][12]

Since end-to-end encrypted services cannot offer decrypted messages in response to government requests, the proliferation of E2EE has been met with controversy.[13][14] Around the world, governments, law enforcement agencies, and child protection groups have expressed concerns over its impact on criminal investigations.[15] As of 2025, some governments have successfully passed legislation targeting E2EE, such as Australia's Telecommunications and Other Legislation Amendment Act (2018) and the Online Safety Act (2023) in the UK. Other attempts at restricting E2EE include the EARN IT Act in the US and the Child Sexual Abuse Regulation in the EU.[16] Nevertheless, some government bodies such as the UK's Information Commissioner's Office and the US's Cybersecurity and Infrastructure Security Agency (CISA) have argued for the use of E2EE, with Jeff Greene of the CISA advising that "encryption is your friend" following the discovery of the Salt Typhoon espionage campaign in 2024.[17][18][3]

Definitions

[edit]

End-to-end encryption is a means of ensuring the security of communications in applications like secure messaging.[19] Under E2EE, messages are encrypted on the sender's device such that they can be decoded only by the final recipient's device.[20] In many non-E2EE messaging systems, including email and many chat platforms, messages pass through intermediaries and are stored by a third party service provider,[21] from which they are retrieved by the recipient. Even if messages are encrypted, they are only encrypted 'in transit', and are thus accessible by the service provider.[22] Server-side disk encryption is also distinct from E2EE because it does not prevent the service provider from viewing the information, as they have the encryption keys and can simply decrypt it.

The term "end-to-end encryption" originally only meant that the communication is never decrypted during its transport from the sender to the receiver.[23] For example, around 2003, E2EE was proposed as an additional layer of encryption for GSM[24] or TETRA,[25] in addition to the existing radio encryption protecting the communication between the mobile device and the network infrastructure. This has been standardized by SFPG for TETRA.[26] Note that in TETRA, the keys are generated by a Key Management Centre (KMC) or a Key Management Facility (KMF), not by the communicating users.[27]

Later, around 2014, the meaning of "end-to-end encryption" started to evolve when WhatsApp encrypted a portion of its network,[28] requiring that not only the communication stays encrypted during transport,[29] but also that the provider of the communication service is not able to decrypt the communications—maliciously or when requested by law enforcement agencies. Similarly, messages must be undecryptable in transit by attackers through man-in-the-middle attacks.[7] This new meaning is now the widely accepted one.[30]

Motivations

[edit]

The lack of end-to-end encryption can allow service providers to easily provide search and other features, or to scan for illegal and unacceptable content. However, it also means that content can be read by anyone who has access to the data stored by the service provider, by design or via a backdoor.[31] This can be a concern in many cases where privacy is important, such as in governmental and military communications, financial transactions, and when sensitive information such as health and biometric data are sent. If this content were shared without E2EE, a malicious actor or adversarial government could obtain it through unauthorized access or subpoenas targeted at the service provider.[14]

E2EE alone does not guarantee privacy or security.[32] For example, the data may be held unencrypted on the user's own device or accessed through their own app if their credentials are compromised.

Modern implementations

[edit]

Messaging

[edit]

As of 2025, messaging apps like Signal[10] and WhatsApp[33] are designed to exclusively use end-to-end encryption. Both Signal and WhatsApp use the Signal Protocol. Other messaging apps and protocols that support end-to-end encryption include Facebook Messenger,[34] iMessage,[35] Telegram,[36] Matrix,[37] and Keybase.[38] Although Telegram supports end-to-end encryption, it has been criticized for not enabling it by default, instead supporting E2EE through opt-in "secret chats". As of 2020, Telegram did not support E2EE for group chats and no E2EE on its desktop clients.

In 2022, after controversy over the use of Facebook Messenger messages in an abortion lawsuit in Nebraska, Facebook added support for end-to-end encryption in the Messenger app.[39][40] Writing for Wired, technologist Albert Fox Cahn criticized Messenger's approach to end-to-end encryption, which required the user to opt into E2EE for each conversation and split the message thread into two chats which were easy for users to confuse.[41] In December 2023, Facebook announced plans to enable end-to-end encryption by default despite pressure from British law enforcement agencies.[42]

As of 2016,[43] many server-based communications systems did not include end-to-end encryption.[44] These systems can only guarantee the protection of communications between clients and servers,[45] meaning that users have to trust the third parties who are running the servers with the sensitive content. End-to-end encryption is regarded as safer[46] because it reduces the number of parties who might be able to interfere or break the encryption.[47] In the case of instant messaging, users may use a third-party client or plugin to implement an end-to-end encryption scheme over an otherwise non-E2EE protocol.[48]

Audio and video conferencing

[edit]

Signal and WhatsApp use end-to-end encryption for audio and video calls.[citation needed] Since 2020, Signal has used end-to-encryption for group video calls.[49] In 2024, Discord introduced support for end-to-end encryption of audio and video calls, voice channels, and certain live streams.[50] However, they had no plans to implement E2EE for messages.

In 2020, following an acquisition of Keybase, Zoom announced plans to add end-to-end encryption support for paying customers.[51][52] After criticism from human rights advocates for making privacy a paid feature, Zoom enabled end-to-end encryption for all customers with Zoom accounts.[53][54] In 2021, Zoom agreed to a $85M class action lawsuit settlement for misrepresentation about end-to-end encryption.[55] The FTC announced that Zoom had access to cryptographic keys that would let it access meetings on the platform.[56]

Other uses

[edit]

Some encrypted backup and file sharing services provide client-side encryption. This type of encryption is not referred to as end-to-end encryption because only one end has the ability to decrypt the data. However, the term "end-to-end encryption" is sometimes incorrectly used to describe client-side encryption.[57]

Some non-E2EE systems, such as Lavabit and Hushmail, have described themselves as offering "end-to-end" encryption when they did not.[58]

Law enforcement and regulation

[edit]
Unsealed 2021 subpoena addressed to Signal Messenger LLC requesting records for a redacted Signal profile name.
Unsealed 2021 subpoena addressed to Signal Messenger LLC requesting records for a redacted Signal profile name.

In 2022, Facebook Messenger came under scrutiny because the messages between a mother and daughter in Nebraska were used to seek criminal charges in an abortion-related case against both of them. The daughter told the police that she had a miscarriage and tried to search for the date of her miscarriage in her Messenger app. Police suspected there could be more information within the messages and obtained and served a warrant against Facebook to gain access. The messages allegedly mentioned the mother obtaining abortion pills for her daughter and then burning the evidence.

While E2EE can offer privacy benefits that make it desirable in consumer-grade services, many businesses have to balance these benefits with their regulatory requirements. For example, many organizations are subject to mandates that require them to be able to decrypt any communication between their employees or between their employees and third parties.[59] This might be needed for archival purposes, for inspection by Data Loss Prevention (DLP) systems, for litigation-related eDiscovery or for detection of malware and other threats in the data streams. For this reason, some enterprise-focused communications and information protection systems might implement encryption in a way that ensures all transmissions are encrypted with the encryption being terminated at their internal systems (on-premises or cloud-based) so they can have access to the information for inspection and processing.

Challenges

[edit]

Man-in-the-middle attacks

[edit]

End-to-end encryption ensures that data is transferred securely between endpoints. But, rather than try to break the encryption, an eavesdropper may impersonate a message recipient (during key exchange or by substituting their public key for the recipient's), so that messages are encrypted with a key known to the attacker. After decrypting the message, the snoop can then encrypt it with a key that they share with the actual recipient, or their public key in case of asymmetric systems, and send the message on again to avoid detection. This is known as a man-in-the-middle attack (MITM).[1][60]

Authentication

[edit]
Screenshot of the Signal Android app showing a screen labelled "Verify safety number" with a QR code and a series of 60 digits. Below the digits is the note "To verify end-to-end encryption with [redacted], compare the numbers above with their device. You can also scan the code on their device. Learn more". Under the note is a button labelled "Mark as verified".
"Verify safety number" screen on Signal Android 7.43.1

Most end-to-end encryption protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, one could rely on certification authorities or a web of trust.[61] An alternative technique is to generate cryptographic hashes (fingerprints) based on the communicating users’ public keys or shared secret keys. The parties compare their fingerprints using an outside (out-of-band) communication channel that guarantees integrity and authenticity of communication (but not necessarily secrecy[citation needed]), before starting their conversation. If the fingerprints match, there is, in theory, no man in the middle.[1]

When displayed for human inspection, fingerprints usually use some form of binary-to-text encoding[citation needed].[62] These strings are then formatted into groups of characters for readability. Some clients instead display a natural language representation of the fingerprint.[63] As the approach consists of a one-to-one mapping between fingerprint blocks and words, there is no loss in entropy. The protocol may choose to display words in the user's native (system) language.[63] This can, however, make cross-language comparisons prone to errors.[64]

In order to improve localization, some protocols have chosen to display fingerprints as base 10 strings instead of more error prone hexadecimal or natural language strings.[65][64]

Modern messaging applications can also display fingerprints as QR codes that users can scan off each other's devices.[65]

Endpoint security

[edit]

The end-to-end encryption paradigm does not directly address risks at the communications endpoints themselves. Each user's computer can still be hacked to steal their cryptographic key (to create a MITM attack) or simply read the recipients’ decrypted messages both in real time and from log files. Even the most perfectly encrypted communication pipe is only as secure as the mailbox on the other end.[1] Major attempts to increase endpoint security have been to isolate key generation, storage and cryptographic operations to a smart card such as Google's Project Vault.[66] However, since plaintext input and output are still visible to the host system, malware can monitor conversations in real time. A more robust approach is to isolate all sensitive data to a fully air gapped computer.[67] However, as Bruce Schneier points out, Stuxnet developed by US and Israel successfully jumped air gap and reached Natanz nuclear plant's network in Iran.[68] To deal with key exfiltration with malware, one approach is to split the Trusted Computing Base behind two unidirectionally connected computers that prevent either insertion of malware, or exfiltration of sensitive data with inserted malware.[69]

Backdoors

[edit]

A backdoor is usually a secret method of bypassing normal authentication or encryption in a computer system, a product, an embedded device, etc.[70] Companies may also willingly or unwillingly introduce backdoors to their software that help subvert key negotiation or bypass encryption altogether. In 2013, information leaked by Edward Snowden showed that Skype had a backdoor which allowed Microsoft to hand over their users' messages to the NSA despite the fact that those messages were officially end-to-end encrypted.[71][72]

Following terrorist attacks in San Bernardino in 2015 and Pensacola in 2019, the FBI requested backdoors to Apple's iPhone software. The company, however, refused to create a backdoor for the government, citing concern that such a tool could pose risk for its consumers’ privacy.[73]

See also

[edit]

References

[edit]
  1. ^ a b c d Greenberg, Andy (2025-08-05). "Hacker Lexicon: What Is End-to-End Encryption?". WIRED. Archived from the original on 23 December 2015. Retrieved 22 December 2015.
  2. ^ Nellis, Stephen (2025-08-05). "Apple-backed study finds rise in data breaches as iPhone maker defends encryption stance". Reuters.
  3. ^ a b Lyons, Jessica (December 5, 2024). "T-Mobile US CSO: Spies jumped from one telco to another in a way 'I've not seen in my career'". The Register.
  4. ^ Landau, Susan (2025-08-05). "End-to-End Encryption Is a Critical National Security Tool". Lawfare.
  5. ^ "ECtHR: Weakening encryption can violate human right to privacy". European Digital Rights (EDRi). Retrieved 2025-08-05.
  6. ^ Granick, Jennifer Stisa; Gillmor, Daniel Kahn (2025-08-05). "The Vital Role of End-to-End Encryption | ACLU". American Civil Liberties Union. Retrieved 2025-08-05.
  7. ^ a b Perlroth, Nicole (2025-08-05). "What Is End-to-End Encryption? Another Bull's-Eye on Big Tech". The New York Times. ISSN 0362-4331. Retrieved 2025-08-05.
  8. ^ Mehta, Ivan (2025-08-05). "WhatsApp now has more than 3 billion users a month". TechCrunch. Retrieved 2025-08-05.
  9. ^ "What to know about Signal, the app used by Trump officials to text war plans - CBS News". www.cbsnews.com. 2025-08-05. Retrieved 2025-08-05.
  10. ^ a b Nierenberg, Amelia (2025-08-05). "Signal Downloads Are Way Up Since the Protests Began". The New York Times. ISSN 0362-4331. Retrieved 2025-08-05.
  11. ^ Perrigo, Billy (2025-08-05). "Meredith Whittaker Shares What's Next for Signal". TIME. Retrieved 2025-08-05.
  12. ^ Greenberg, Andy. "SignalGate Isn't About Signal". Wired. ISSN 1059-1028. Retrieved 2025-08-05.
  13. ^ McLaughlin, Jenna (21 December 2015). "Democratic Debate Spawns Fantasy Talk on Encryption". The Intercept. Archived from the original on 23 December 2015.
  14. ^ a b Weinstein, Gary. "Encryption: The Necessary Tool For U.S. National Security And The Intelligence Community". Forbes. Retrieved 2025-08-05.
  15. ^ Scheffler, Sarah; Mayer, Jonathan (2023). "SoK: Content Moderation for End-to-End Encryption". Proceedings on Privacy Enhancing Technologies. 2023 (2): 403–404. arXiv:2303.03979. doi:10.56553/popets-2023-0060. ISSN 2299-0984.
  16. ^ Riedenstein, Clara; Echikson, William (2025-08-05). "Encryption versus Child Safety: Westminster Blinks". CEPA. Retrieved 2025-08-05.
  17. ^ "Encryption: UK data watchdog criticises government campaign". BBC News. 21 January 2022.
  18. ^ Lyons, Jessica (January 4, 2025). "Encryption backdoor debate 'done and dusted,' former White House tech advisor says". The Register.
  19. ^ Hale, Britta; Komlo, Chelsea (2022), On End-to-End Encryption, 2022/449, retrieved 2025-08-05
  20. ^ "End-to-end encryption". Surveillance Self-Defense. Electronic Frontier Foundation. Retrieved 2025-08-05.
  21. ^ "Cryptography Concepts – Fundamentals – E3Kit | Virgil Security". developer.virgilsecurity.com. Retrieved 2025-08-05.
  22. ^ Mundhenk, Ben Rothke and David (2025-08-05). "End-to-End Encryption: The PCI Security Holy Grail". CSO Online. Retrieved 2025-08-05.
  23. ^ Baran, Paul (1964). "IX. Security, Secrecy, and Tamper-Free Considerations. III. Some Fundamentals of Cryptography". On Distributed Communications. RAND corporation. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  24. ^ Moldal, L.; Jorgensen, T. (11 February 2003). "End to end encryption in GSM, DECT and satellite networks using NSK200". IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications. Vol. 2003. IET. p. 5. doi:10.1049/ic:20030013.
  25. ^ Murgatroyd, Brian (11 February 2003). "End to end encryption in public safety TETRA networks". IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications. Vol. 2003. IET. p. 7. doi:10.1049/ic:20030015.
  26. ^ "New chair for the SFPG". 2007.
  27. ^ Morquecho Martinez, Raul Alejandro (31 March 2016). Delivery of encryption keys in TETRA networks (PDF) (Master's Thesis). Aalto University.
  28. ^ "Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People". Wired. ISSN 1059-1028. Retrieved 2025-08-05.
  29. ^ Mtega, Wulystan Pius (Jan 2021). "Using WhatsApp Messenger for improving learners' engagement in teaching and learning: a case of undergraduate students at the Sokoine University of Agriculture, Tanzania". Library Philosophy and Practice: 1–18. ProQuest 2492709488.
  30. ^ Lewis, James A., Denise E. Zheng, and William A. Carter. "The effect of encryption on lawful access to communications and data". Rowman & Littlefield.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  31. ^ Gillmor, Jennifer Stisa Granick, Daniel Kahn (2025-08-05). "The Vital Role of End-to-End Encryption | ACLU". American Civil Liberties Union. Retrieved 2025-08-05.{{cite web}}: CS1 maint: multiple names: authors list (link)
  32. ^ Meehan, Tom (2025-08-05). "End-to-End Encryption Doesn't Guarantee Internet Privacy". Loss Prevention Media. Retrieved 2025-08-05.
  33. ^ Salter, Jim (2025-08-05). "WhatsApp "end-to-end encrypted" messages aren't that private after all". Ars Technica. Retrieved 2025-08-05.
  34. ^ Krasnoff, Barbara (2025-08-05). "How to encrypt Facebook Messenger chats". The Verge. Retrieved 2025-08-05.
  35. ^ Hoffman, Chris (2025-08-05). "Apple's iMessage Is Secure ... Unless You Have iCloud Enabled". How-To Geek. Retrieved 2025-08-05.
  36. ^ Burgess, Matt. "Switched to Telegram? You need to know this about its encryption". Wired. ISSN 1059-1028. Retrieved 2025-08-05.
  37. ^ Goodin, Dan (2025-08-05). "Serious vulnerabilities in Matrix's end-to-end encryption have been patched". Ars Technica. Retrieved 2025-08-05.
  38. ^ "Keybase's encrypted chat works with accounts you already have". Engadget. 2025-08-05. Retrieved 2025-08-05.
  39. ^ Duffy, Sara O'Brien, Clare (2025-08-05). "Nebraska teen and mother facing charges in abortion-related case that involved obtaining their Facebook messages | CNN Business". CNN. Retrieved 2025-08-05.{{cite web}}: CS1 maint: multiple names: authors list (link)
  40. ^ Duffy, Clare (2025-08-05). "Meta testing expanded encryption features amid renewed scrutiny of messaging data | CNN Business". CNN. Retrieved 2025-08-05.
  41. ^ Cahn, Albert Fox. "Facebook's Message Encryption Was Built to Fail". Wired. ISSN 1059-1028. Retrieved 2025-08-05.
  42. ^ "Facebook and Messenger to automatically encrypt messages". 2025-08-05. Retrieved 2025-08-05.
  43. ^ "A history of end-to-end encryption and the death of PGP". www.cryptologie.net. Retrieved 2025-08-05.
  44. ^ Nabeel, Mohamed (2025-08-05). "The Many Faces of End-to-End Encryption and Their Security Analysis". 2017 IEEE International Conference on Edge Computing (EDGE). IEEE. pp. 252–259. doi:10.1109/ieee.edge.2017.47. ISBN 978-1-5386-2017-5. S2CID 3419988.
  45. ^ "What is End-to-end encryption (E2EE) ?". Geneva Business News | Actualités: Emploi, RH, économie, entreprises, Genève, Suisse. (in French). 2025-08-05. Retrieved 2025-08-05.
  46. ^ Bai, Wei; Pearson, Michael; Kelley, Patrick Gage; Mazurek, Michelle L. (September 2020). "Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study". 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). Genoa, Italy: IEEE. pp. 210–219. doi:10.1109/EuroSPW51379.2020.00036. ISBN 978-1-7281-8597-2. S2CID 220524858.
  47. ^ "End-to-End Encryption". EFF Surveillance Self-Defense Guide. Electronic Frontier Foundation. Archived from the original on 5 March 2016. Retrieved 2 February 2016.
  48. ^ "How to: Use OTR for Windows". EEF Surveillance Self-Defence Guide. Electronic Frontier Foundation. Archived from the original on 20 January 2016. Retrieved 2 February 2016.
  49. ^ Roth, Emma (2025-08-05). "Signal Now Lets You Make Encrypted Group Video Calls". MakeUseOf. Retrieved 2025-08-05.
  50. ^ Franceschi-Bicchierai, Lorenzo (2025-08-05). "Discord launches end-to-end encrypted voice and video chats". TechCrunch. Retrieved 2025-08-05.
  51. ^ "Zoom Acquires Keybase to Help It Build End-to-End Encryption for Video Sessions". PCMAG. 2025-08-05. Retrieved 2025-08-05.
  52. ^ Newman, Lily Hay. "Zoom's End-to-End Encryption Will Be for Paying Customers Only". Wired. ISSN 1059-1028. Retrieved 2025-08-05.
  53. ^ Goodin, Dan (2025-08-05). "Amid pressure, Zoom will end-to-end encrypt all calls, free or paid". Ars Technica. Retrieved 2025-08-05.
  54. ^ Thorbecke, Catherine (June 2020). "'A big victory': Zoom to provide end-to-end encryption after mounting privacy concerns". ABC News. Retrieved 2025-08-05.
  55. ^ Brodkin, Jon (2025-08-05). "Zoom to pay $85M for lying about encryption and sending data to Facebook and Google". Ars Technica. Retrieved 2025-08-05.
  56. ^ Brodkin, Jon (2025-08-05). "Zoom lied to users about end-to-end encryption for years, FTC says". Ars Technica. Retrieved 2025-08-05.
  57. ^ "Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study". ResearchGate. Retrieved 2025-08-05.
  58. ^ Grauer, Yael. "Mr. Robot Uses ProtonMail, But It Still Isn't Fully Secure". WIRED. Archived from the original on 2025-08-05.
  59. ^ "Why GDPR Makes it Urgent to Scan Encrypted Traffic for Data Loss". SonicWall. 28 November 2017.
  60. ^ Schneier, Bruce; Ferguson, Niels; Kohno, Tadayoshi (2010). Cryptography engineering : design principles and practical applications. Indianapolis, IN: Wiley Pub., inc. p. 183. ISBN 978-0470474242.
  61. ^ "What is man-in-the-middle attack (MitM)? – Definition from WhatIs.com". IoT Agenda. Archived from the original on 5 January 2016. Retrieved 7 January 2016.
  62. ^ Dechand, Sergej (10–12 August 2016). "An Empirical Study of Textual Key-Fingerprint Representations" (PDF). The Advanced Computing System Association: 1–17.
  63. ^ a b "pEp White Paper" (PDF). pEp Foundation Council. 18 July 2016. Archived (PDF) from the original on 1 October 2016. Retrieved 11 October 2016.
  64. ^ a b Marlinspike, Moxie (5 April 2016). "WhatsApp's Signal Protocol integration is now complete". Open Whisper Systems. Archived from the original on 10 October 2016. Retrieved 11 October 2016.
  65. ^ a b Budington, Bill (7 April 2016). "WhatsApp Rolls Out End-To-End Encryption to its Over One Billion Users". Deeplinks Blog. Electronic Frontier Foundation. Archived from the original on 12 September 2016. Retrieved 11 October 2016.
  66. ^ Julie Bort, Matt Weinberger "Google's Project Vault is a tiny computer for sending secret messages" Archived 2025-08-05 at the Wayback Machine, Business Insider, NYC May 29, 2015
  67. ^ Whonix Wiki "Air Gapped OpenPGP Key" Archived 2025-08-05 at the Wayback Machine
  68. ^ Bruce Schneier "Air Gaps" Archived 2025-08-05 at the Wayback Machine, Schneier on Security, October 11, 2013
  69. ^ "maqp/tfc". GitHub. Archived from the original on 31 March 2017. Retrieved 26 April 2018.
  70. ^ Eckersley, Peter; Portnoy, Erica (8 May 2017). "Intel's Management Engine is a security hazard, and users need a way to disable it". www.eff.org. Archived from the original on 6 March 2018. Retrieved 7 March 2018.
  71. ^ Goodin, Dan (20 May 2013). "Think your Skype messages get end-to-end encryption? Think again". Ars Technica. Archived from the original on 22 December 2015.
  72. ^ Greenwald, Glenn; MacAskill, Ewen; Poitras, Laura; Ackerman, Spencer; Rushe, Dominic (12 July 2013). "Microsoft handed the NSA access to encrypted messages". the Guardian. Archived from the original on 19 November 2015.
  73. ^ Leswing, Kif (2025-08-05). "Apple's fight with Trump and the Justice Department is about more than two iPhones". CNBC. Retrieved 2025-08-05.

Further reading

[edit]
绿原酸是什么 vivo是什么牌子 座是什么结构 知了吃什么东西 下载什么软件可以赚钱
第三产业是什么 经常低血糖是什么原因 什么是粘胶纤维 耳钉什么材质的好 孕初期吃什么对胎儿好
唐僧最后成了什么佛 7月14日什么节日 女性白带多吃什么药 骨质增生吃什么药效果好 每天喝一杯豆浆有什么好处
扁桃体发炎吃什么药比较好 水杨酸是什么 银杯子喝水有什么好处与坏处 什么是气质 定性和定量是什么意思
慈母手中线的下一句是什么jinxinzhichuang.com 火影忍者大结局是什么hcv7jop7ns0r.cn 什么有成什么hcv8jop2ns1r.cn 雍正是什么星座wuhaiwuya.com 三伏贴什么时候贴最好hcv9jop1ns5r.cn
舌头痛吃什么药好hcv8jop3ns9r.cn 梦见捡到钱是什么预兆hcv8jop2ns4r.cn 什么是对食hcv8jop0ns7r.cn 烧心是什么意思hebeidezhi.com 支气管炎吃什么药最好hcv8jop1ns6r.cn
养肝护肝吃什么药hcv9jop8ns3r.cn 检查脖子挂什么科hcv7jop5ns4r.cn 不值一提是什么意思hcv7jop7ns3r.cn 半夜流鼻血是什么原因xjhesheng.com 6.18是什么星座hcv9jop7ns5r.cn
遂成大学的遂是什么意思hcv8jop0ns8r.cn 海蛎子是什么hcv7jop6ns9r.cn 前列腺炎吃什么药效果好见效快hcv7jop9ns2r.cn 陈皮有什么功效作用hcv9jop2ns3r.cn 9.24是什么星座hcv9jop8ns0r.cn
百度