[Cryptography] NSA security guidelines for videoconferencing
pgut001 at cs.auckland.ac.nz
Mon May 4 20:23:06 EDT 2020
Alfie John <alfie at alfie.wtf> writes:
>Can a system really be called end-to-end when someone not at either end can
It's called end-to-end encryption because possibly-compromised-device-
controlled-by-party-2 encryption doesn't roll off the tongue as easily.
More information about the cryptography