iLoungeiLounge
  • News
    • Apple
      • AirPods Pro
      • AirPlay
      • Apps
        • Apple Music
      • iCloud
      • iTunes
      • HealthKit
      • HomeKit
      • HomePod
      • iOS 13
      • Apple Pay
      • Apple TV
      • Siri
    • Rumors
    • Humor
    • Technology
      • CES
    • Daily Deals
    • Articles
    • Web Stories
  • iPhone
    • iPhone Accessories
  • iPad
  • iPod
    • iPod Accessories
  • Apple Watch
    • Apple Watch Accessories
  • Mac
    • MacBook Air
    • MacBook Pro
  • Reviews
    • App Reviews
  • How-to
    • Ask iLounge
Font ResizerAa
iLoungeiLounge
Font ResizerAa
Search
  • News
    • Apple
    • Rumors
    • Humor
    • Technology
    • Daily Deals
    • Articles
    • Web Stories
  • iPhone
    • iPhone Accessories
  • iPad
  • iPod
    • iPod Accessories
  • Apple Watch
    • Apple Watch Accessories
  • Mac
    • MacBook Air
    • MacBook Pro
  • Reviews
    • App Reviews
  • How-to
    • Ask iLounge
Follow US

Articles

Articles

Explaining end-to-end Encryption and Private Messaging

Last updated: Jun 22, 2023 7:06 pm UTC
By Lucy Bennett
Explaining end-to-end Encryption and Private Messaging

End-to-end encryption (E2EE) is a privacy-oriented technology, alleviating the common fears about government and other third-party surveillance. For some, this systematic and private transmission of data is the holy grail. 


However, the dilemma between privacy and physical security is an on-and-off battle. Indeed, end-to-end encryption shelters users and guarantees that only the communicating entities can read the exchanged messages. However, considering the full spectrum of privacy, E2EE is not always welcome.

Explaining end-to-end Encryption and Private Messaging

What is end-to-end encryption? 

End-to-end encryption is a process of encrypting messages at both ends and ensuring that only communicating parties can read each other’s interaction. Nowadays, most of our socializing has shifted to virtual space. 

Instead of relying on face-to-face conversations, we fully engage in chats through instant messaging apps. So, end-to-end encryption refers to the technology that encrypts data until it reaches the final destination. No in-between locations have the key to decipher such messages. As a result, it shields your communications from prying eyes, including specific service providers and the ISPs. 


How does end-to-end encryption work? 

End-to-end encryption scrambles messages to prevent external sources from reading them. Exchanged information is only available in plaintext to the sender and the recipient. At its core, this process includes the encryption of messages on the sender’s device. Then, the intended recipient’s device uses a special key to decrypt the information. 

During the standard transport layer encryption, a specific entity encrypts messages but retains access to the plaintext versions. Hence, if criminals use certain messaging tools, their owners can hand over the requested transcripts of conversations. Thus, not all are ready to give a standing ovation to end-to-end encryption integration. 


Law enforcement agencies continue to highlight the price of the complete privacy security advocates dream of achieving. According to them, end-to-end encryption makes it impossible to surveil felons and prevent crime. 

Hence, while the security advocates steer the wheel towards total internet privacy, investigators wonder whether this won’t create an ideal environment for criminals. In the US, the EARN IT Act is the current threat to digital privacy. If passed, end-to-end encryption would no longer be possible if services wish to meet the new demands. 


This data transmission technique is a typical component of popular messaging apps. While some require users to start separate chats to activate end-to-end encryption, others offer it as the standard way of communication. For instance, WhatsApp empowers all chats with end-to-end encryption automatically. However, to get the same level of privacy on Facebook Messenger, you need to start a secret conversation. So, you might need to check the exact approach used on your preferred messaging app. 

The drawbacks of end-to-end encryption

End-to-end encryption indeed is an art of cryptography that many people choose for their communications. While E2EE applies an impressive amount of protection for the transmitted messages, endpoint security is another subject. Inboxes and accounts remain vulnerable to vicious attacks. So, while intrusive entities have no way of reading messages during the exchange, they can break into your inboxes to get direct access.


Steps to secure your accounts

Change passwords regularly

It might be inconvenient to remember a new combination. However, you should never use the same password for too long. Luckily, there are handy password managers that can store all your combinations.  

Use a VPN to encrypt all web traffic

Do not settle for encryption of your messages: choose to become invisible online. A VPN is a privacy-oriented tool that encrypts and encapsulates all your data transmissions and traffic. If you download VPN to your device, you won’t have to worry about third-party entities intercepting your connection. Not even your ISP provider will have access to your browsing history or exchanged messages.


Two-factor authentication for all your accounts

2FA goes beyond passwords and usernames, which might seem like overkill. However, this additional step guarantees that outside parties won’t be able to hijack your account. Even if they manage to steal your credentials, service providers will deny access without proper verification. 

Limited opportunities to use E2EE

If you could, you would activate end-to-end encryption for all your online transactions and data exchanges. However, while this option is available to some extent, it is not as widespread as you would expect. 


No encryption for backup data

Usually, the backup data does not receive the same treatment. While service providers encrypt it, end-to-end encryption is not a typical guest during these processes. While the demand for such options spikes, the service providers are hesitant to meet it. 

For instance, WhatsApp does not encrypt the backup messages retained on the Google Drive servers. Hence, Google can get the first-row seat to your messages. Pay attention to whether services apply encryption consistently, without leaving any exploitable flaws. 


Latest News
The AirPods Pro 3 is $20 Off
The AirPods Pro 3 is $20 Off
1 Min Read
Exynos 2600 Chip 2nm Process Revealed by Samsung
Exynos 2600 Chip 2nm Process Revealed by Samsung
1 Min Read
New Celebrity Ad Campaign Featuring Travis Scott Released by Beats
New Celebrity Ad Campaign Featuring Travis Scott Released by Beats
1 Min Read
Australia Getting Hypertension Notification Feature
Australia Getting Hypertension Notification Feature
1 Min Read
The 14-inch MacBook Pro with M5 Chip 16GB RAM/512GB is $250 Off
The 14-inch MacBook Pro with M5 Chip 16GB RAM/512GB is $250 Off
1 Min Read
Noise and Static on AirPods Pro 3 Still Unfixed
Noise and Static on AirPods Pro 3 Still Unfixed
1 Min Read
New iMac with 24-inch OLED Display May be Brighter With 600 Nits
New iMac with 24-inch OLED Display May be Brighter With 600 Nits
1 Min Read
The 15-inch M4 MacBook Air 256GB Is $250 Off
The 15-inch M4 MacBook Air 256GB Is $250 Off
1 Min Read
Internal Kernel Debug Kit from Apple Reveals Tests for a MacBook with A15 Chip
Internal Kernel Debug Kit from Apple Reveals Tests for a MacBook with A15 Chip
1 Min Read
Apple Currently In Talks With Suppliers for Chip Assembly & Packaging of iPhones in India
Apple Currently In Talks With Suppliers for Chip Assembly & Packaging of iPhones in India
1 Min Read
Apple Allows Easier Battery Replacement For M5 MacBook Pro with 14-inch Display
Apple Allows Easier Battery Replacement For M5 MacBook Pro with 14-inch Display
1 Min Read
The Apple Watch SE 3 44mm GPS is $50 Off
The Apple Watch SE 3 44mm GPS is $50 Off
1 Min Read

iLounge logo

iLounge is an independent resource for all things iPod, iPhone, iPad, and beyond. iPod, iPhone, iPad, iTunes, Apple TV, and the Apple logo are trademarks of Apple Inc.

This website is not affiliated with Apple Inc.
iLounge © 2001 - 2025. All Rights Reserved.
  • Contact Us
  • Submit News
  • About Us
  • Forums
  • Privacy Policy
  • Terms Of Use
Welcome Back!

Sign in to your account

Lost your password?