[Cryptography] NSA security guidelines for videoconferencing

Peter Gutmann pgut001 at cs.auckland.ac.nz
Mon May 4 20:23:06 EDT 2020


Alfie John <alfie at alfie.wtf> writes:

>Can a system really be called end-to-end when someone not at either end can
>decrypt?

It's called end-to-end encryption because possibly-compromised-device-
allegedly-controlled-by-party-1-to-possibly-compromised-device-allegedly-
controlled-by-party-2 encryption doesn't roll off the tongue as easily.

Peter.


More information about the cryptography mailing list