[Cryptography] NSA security guidelines for videoconferencing
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Mon May 4 20:23:06 EDT 2020
Alfie John <alfie at alfie.wtf> writes:
>Can a system really be called end-to-end when someone not at either end can
>decrypt?
It's called end-to-end encryption because possibly-compromised-device-
allegedly-controlled-by-party-1-to-possibly-compromised-device-allegedly-
controlled-by-party-2 encryption doesn't roll off the tongue as easily.
Peter.
More information about the cryptography
mailing list