[Cryptography] NSA security guidelines for videoconferencing

Peter Gutmann pgut001 at cs.auckland.ac.nz
Mon May 4 20:23:06 EDT 2020

Alfie John <alfie at alfie.wtf> writes:

>Can a system really be called end-to-end when someone not at either end can

It's called end-to-end encryption because possibly-compromised-device-
controlled-by-party-2 encryption doesn't roll off the tongue as easily.


More information about the cryptography mailing list