Florian Weimer wrote:

It's also an open question whether network operators subject to
interception requirements can legally offer built-in E2E encryption
capabilities without backdoors.


You probably meant device vendors, not network operators. The whole *point* of E2E security is that network operators are not involved. If they were, it wouldn't be end-to-end!

/ji

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to