Florian Weimer wrote:
It's also an open question whether network operators subject to interception requirements can legally offer built-in E2E encryption capabilities without backdoors.
You probably meant device vendors, not network operators. The whole *point* of E2E security is that network operators are not involved. If they were, it wouldn't be end-to-end!
/ji --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]