End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including...
42 KB (4,090 words) - 22:23, 22 July 2025
endpoint programmers to focus on the business logic for sending messages. End-to-end encryption History of the Internet Peer-to-peer Protocol Wars The...
32 KB (4,203 words) - 22:23, 26 April 2025
End-to-end delay, the time for a packet to be transmitted across a network from source to destination End-to-end encryption, a cryptographic paradigm involving...
860 bytes (164 words) - 10:01, 25 February 2021
traffic, link encryption defeats traffic analysis. On the other hand, end-to-end encryption ensures only the intended recipient has access to the plaintext...
2 KB (205 words) - 05:00, 14 May 2025
Email encryption is encryption of email messages to protect the content from being read by entities other than the intended recipients. Email encryption may...
14 KB (1,675 words) - 18:29, 1 August 2025
ICloud (section End-to-end encryption)
optional paid plans to up to 12 TB; all paid plans include iCloud+ providing additional features. Optional end-to-end encryption has been available since...
58 KB (5,693 words) - 08:57, 26 July 2025
Online Safety Act 2023 (category Encryption debate)
privacy and encryption. Apple Inc. called the legislation a "serious threat" to end-to-end encryption, warning that it could force the company to weaken security...
51 KB (4,796 words) - 09:25, 2 August 2025
Data Encryption Standard (DES) Decipher Decode Decrypt DECT Standard Cipher Descrambler Dncipher Encode Encoding law Encrypt End-to-end encryption group...
5 KB (446 words) - 21:24, 28 August 2024
encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme...
34 KB (3,645 words) - 19:23, 28 July 2025
meet the P2PE standard are referred to as end-to-end encryption (E2EE) solutions. The objective of P2PE and E2EE is to provide a payment security solution...
7 KB (1,000 words) - 07:24, 16 July 2025
Email privacy (section End to end encryption)
In end-to-end encryption, the data is encrypted and decrypted only at the end points. In other words, an email sent with end-to-end encryption would...
44 KB (5,395 words) - 22:15, 24 May 2025
even to individuals and organizations that have security measures in place to protect their data and information (e.g., firewalls, encryption, strong...
21 KB (2,561 words) - 15:00, 24 May 2025
Signal Protocol (category End-to-end encryption)
Protocol) is a non-federated cryptographic protocol that provides end-to-end encryption for voice and instant messaging conversations. The protocol was...
35 KB (3,055 words) - 19:21, 10 July 2025
End-to-end auditable or end-to-end voter verifiable (E2E) systems are voting systems with stringent integrity properties and strong tamper resistance....
25 KB (2,760 words) - 20:06, 18 June 2025
OMEMO (redirect from OMEMO (encryption))
extension to the Extensible Messaging and Presence Protocol (XMPP) for multi-client end-to-end encryption developed by Andreas Straub. According to Straub...
10 KB (772 words) - 06:20, 10 April 2025
have end-to-end security. Newer, modern protocols, like ZRTP, offer end-to-end encryption for SIP/RTP calls. MIKEY key exchange method ZRTP end-to-end key...
5 KB (815 words) - 14:52, 16 June 2025
Computer network (section End to end encryption)
with communications. End-to-end encryption generally protects both confidentiality and integrity. Examples of end-to-end encryption include HTTPS for web...
101 KB (11,934 words) - 19:30, 26 July 2025
Secure voice (redirect from Voice encryption)
the encryption of voice communication over a range of communication types such as radio, telephone or IP. The implementation of voice encryption dates...
12 KB (1,687 words) - 00:30, 11 November 2024
with a focus on security and privacy that offers OpenPGP based end-to-end encryption and digital signatures for usage in emails. It was launched in November...
5 KB (323 words) - 17:49, 19 March 2025
Rich Communication Services (category End-to-end encryption)
connected to the global RCS network, and additionally was the first to offer end-to-end encryption over RCS. End to end encryption using MLS was added to the...
109 KB (8,211 words) - 13:56, 30 July 2025
WhatsApp (category End-to-end encryption)
criticized for its lack of encryption, sending information as plaintext. Encryption was first added in May 2012. End-to-end encryption was only fully implemented...
213 KB (18,730 words) - 22:10, 26 July 2025
Fast Software Encryption workshop in Leuven in 1994, and first published in the proceedings of that workshop. The cipher is not subject to any patents....
13 KB (1,189 words) - 16:09, 1 July 2025
support end-to-end encryption. In June 2021, Google introduced end-to-end encryption in Messages by default using the Signal Protocol, for all one-to-one...
16 KB (1,438 words) - 23:10, 25 July 2025
Telegram (software) (category End-to-end encryption)
iOS, Windows, macOS, Linux, and web browsers. Telegram offers end-to-end encryption in voice and video calls, and optionally in private chats if both...
218 KB (19,574 words) - 15:23, 2 August 2025
UK encryption ban was a pledge by former British prime minister David Cameron to ban online messaging applications that offer end-to-end encryption, such...
9 KB (766 words) - 05:53, 31 May 2025
Proton Mail (category End-to-end encryption)
Wallet. Proton Mail uses client-side encryption to protect email content and user data before they are sent to Proton Mail servers, unlike other common...
40 KB (3,783 words) - 02:40, 30 July 2025
Zoom (software) (category End-to-end encryption)
enterprise users, with AES 256 GCM encryption enabled for all users. In October 2020, Zoom added end-to-end encryption for free and paid users. It is available...
101 KB (8,706 words) - 12:05, 31 July 2025
cryptography upgrade to the Diffie–Hellman key exchange. It is notably being incorporated into the Signal Protocol, an end-to-end encryption protocol. In September...
3 KB (266 words) - 22:37, 29 September 2024
messaging client implementing the Matrix protocol. Element supports end-to-end encryption, private and public groups, sharing of files between users, voice...
19 KB (1,193 words) - 12:49, 21 July 2025
through measures like end-to-end encryption for messages, mandatory two-factor authentication based on a word list, and the encryption of sensitive data....
4 KB (415 words) - 22:39, 12 June 2025