Questions tagged [end-to-end-encryption]
90 questions
40
votes
2 answers
Why is there no web client for Signal?
I’ve read about E2EE (end to end encryption) of Signal in web clients on a Signal Community discussion forum, and wonder why they say that the browser is insecure for E2EE and native apps are secure.
I think the security issues for clients are the…
SeyyedKhandon
- 517
- 1
- 4
- 7
38
votes
2 answers
Which protocols exist for end-to-end encrypted group chat?
I am looking for existing protocols for a group chat with two things:
End to end encrypted. Just what you would expect: messages are only decipherable by the chat members and message tampering is detected.
It should not encrypt each message for…
Luc
- 31,973
- 8
- 71
- 135
31
votes
3 answers
Can I use WhatsApp to securely send public key, symmetric key and private key?
I am asking this because WhatsApp says it is end-to-end encrypted.
Are there any problems with sending a public key through WhatsApp?
There might be some objections to sending symmetric and private keys.
Under what circumstances can I send…
Olle Hudga
- 419
- 1
- 3
- 4
27
votes
4 answers
How can WhatsApp do both targeted advertisement and end-to-end encryption?
Recently there have been a lot of news articles which say that Facebook will very soon add advertising to WhatsApp, yet will keep the end-to-end encryption (source):
[M]essages will remain end-to-end encrypted. There are no plans to change that.
I…
ransh
- 515
- 6
- 11
25
votes
7 answers
Is encryption in transit distinct from end-to-end encryption?
I asked a question about HTTPS encryption as it relates to developing a web app here. On the face of it that question has now been closed twice for not being focused enough, but if the meta discussion is anything to go by, it's more realistically…
Hashim Aziz
- 969
- 8
- 21
24
votes
1 answer
How can I verify Keybase's end-to-end encryption between me and a friend?
The premise of end-to-end encryption (E2EE) is that the client is secure and trustworthy, your end devices is secure and trustworthy, but the network and server need not be trusted. You've read all the code in the client, or someone you trust has…
Luc
- 31,973
- 8
- 71
- 135
12
votes
4 answers
How To Recover End-To-End Encrypted Data After Losing Private Key?
I'm creating a mobile app which has chat feature in it. Since I wanted to make it secure, I'll do some encryption to messages and the data. I'm thinking of using End-To-End encryption for it but I've got some issues.
Each user will have private and…
Eagleclaw
- 247
- 2
- 5
8
votes
2 answers
End-to-end Encrypted Group Chat Considerations
I was thinking about building a simple end-to-end encrypted chat with group chat capabilities. Please bare in mind that 1) it's just an experiment to help me know more about cryptography and 2) I'm an humble programmer not a security expert that…
TCB13
- 217
- 3
- 7
7
votes
4 answers
Why does WhatsApp not encrypt Google Drive backups?
WhatsApp has end-to-end encryption, promising privacy to users.
However, it becomes useless if backups to Google Drive are unencrypted. Our supposedly private data goes to the control of Google.
No problem, I can disable the backup. But, what about…
Nuno
- 215
- 2
- 7
5
votes
1 answer
Free messaging (but not images, video, etc) on United Airlines free wifi: is it secure?
I recently flew with United Airlines and I used their free messaging wi-fi plan.
I could text my friends on Whatsapp, but I could not send (nor receive) multimedia content like images, videos or audio clips.
I'm wondering how this works and whether…
kYuZz
- 153
- 3
4
votes
1 answer
How to validate client side safety in a Zero Knowlegde model
What is sometimes called Zero Knowledge, sometimes end to end encryption occurs when a server only processes ciphered data (at least for sensitive data) with a result where a compromise of this server does not threat the confidentiality of the…
Sibwara
- 1,316
- 7
- 19
4
votes
2 answers
Remmina RDP Certificate Fingerprint Changed
I've been using Remmina to connect to my RDP server across the internet. When I first connected to the server, I had to accept the certificate. I have not had to do that since the first time I connected.
Now, after using this server for a long time,…
Doug
- 41
- 3
3
votes
0 answers
Security vs. User Experience – can this Process still be considered to provide proper End-to-End-Encryption?
I am banging my head about this for a while now and would appreciate opinions/different views.
tl;dr
There is a system that aims to provide full end-to-end encryption for information (text messages, blobs) exchanged through it. At the moment, users…
asp_net
- 233
- 2
- 6
3
votes
1 answer
What is the correct way to create a backup copy of a PGP key pair?
I am using GnuPG 2.2.20 to create my key pair.
I have successfully created a key pair, now I want to create a backup copy in case of HDD failure.
Following the instruction here, I have tried
gpg --output backupkeys.pgp --armor --export-secret-keys…
robertspierre
- 495
- 2
- 11
3
votes
0 answers
What secure mobile messaging app is publicly known to be the most frustrating for state intelligence to read?
I imagine like either leaked or otherwise published official memos on efforts and signals intelligence programs to intercept and crack different types of communications either lamenting or chronicling the technical difficulties in doing so and…
Jackie FJA
- 39
- 4