End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including...
42 KB (4,090 words) - 22:23, 22 July 2025
endpoint programmers to focus on the business logic for sending messages. End-to-end encryption History of the Internet Peer-to-peer Protocol Wars The...
32 KB (4,203 words) - 22:23, 26 April 2025
End-to-end delay, the time for a packet to be transmitted across a network from source to destination End-to-end encryption, a cryptographic paradigm involving...
860 bytes (164 words) - 10:01, 25 February 2021
traffic, link encryption defeats traffic analysis. On the other hand, end-to-end encryption ensures only the intended recipient has access to the plaintext...
2 KB (205 words) - 05:00, 14 May 2025
UK encryption ban was a pledge by former British prime minister David Cameron to ban online messaging applications that offer end-to-end encryption, such...
9 KB (766 words) - 05:53, 31 May 2025
ICloud (section End-to-end encryption)
optional paid plans to up to 12 TB; all paid plans include iCloud+ providing additional features. Optional end-to-end encryption has been available since...
58 KB (5,693 words) - 03:45, 4 August 2025
meet the P2PE standard are referred to as end-to-end encryption (E2EE) solutions. The objective of P2PE and E2EE is to provide a payment security solution...
7 KB (1,000 words) - 07:24, 16 July 2025
Email encryption is encryption of email messages to protect the content from being read by entities other than the intended recipients. Email encryption may...
14 KB (1,675 words) - 18:29, 1 August 2025
Online Safety Act 2023 (category Encryption debate)
privacy and encryption. Apple Inc. called the legislation a "serious threat" to end-to-end encryption, warning that it could force the company to weaken security...
51 KB (4,830 words) - 08:52, 4 August 2025
Data Encryption Standard (DES) Decipher Decode Decrypt DECT Standard Cipher Descrambler Dncipher Encode Encoding law Encrypt End-to-end encryption group...
5 KB (446 words) - 21:24, 28 August 2024
Email privacy (section End to end encryption)
In end-to-end encryption, the data is encrypted and decrypted only at the end points. In other words, an email sent with end-to-end encryption would...
44 KB (5,395 words) - 22:15, 24 May 2025
Signal Protocol (category End-to-end encryption)
Protocol) is a non-federated cryptographic protocol that provides end-to-end encryption for voice and instant messaging conversations. The protocol was...
35 KB (3,055 words) - 19:21, 10 July 2025
Proton Mail (category End-to-end encryption)
Wallet. Proton Mail uses client-side encryption to protect email content and user data before they are sent to Proton Mail servers, unlike other common...
40 KB (3,783 words) - 02:40, 30 July 2025
have end-to-end security. Newer, modern protocols, like ZRTP, offer end-to-end encryption for SIP/RTP calls. MIKEY key exchange method ZRTP end-to-end key...
5 KB (815 words) - 14:52, 16 June 2025
support end-to-end encryption. In June 2021, Google introduced end-to-end encryption in Messages by default using the Signal Protocol, for all one-to-one...
16 KB (1,438 words) - 23:10, 25 July 2025
OMEMO (redirect from OMEMO (encryption))
extension to the Extensible Messaging and Presence Protocol (XMPP) for multi-client end-to-end encryption developed by Andreas Straub. According to Straub...
10 KB (772 words) - 06:20, 10 April 2025
Computer network (section End to end encryption)
with communications. End-to-end encryption generally protects both confidentiality and integrity. Examples of end-to-end encryption include HTTPS for web...
101 KB (11,934 words) - 19:30, 26 July 2025
Zoom (software) (category End-to-end encryption)
enterprise users, with AES 256 GCM encryption enabled for all users. In October 2020, Zoom added end-to-end encryption for free and paid users. It is available...
101 KB (8,706 words) - 12:05, 31 July 2025
Secure voice (redirect from Voice encryption)
the encryption of voice communication over a range of communication types such as radio, telephone or IP. The implementation of voice encryption dates...
12 KB (1,687 words) - 00:30, 11 November 2024
Telegram (software) (category End-to-end encryption)
iOS, Windows, macOS, Linux, and web browsers. Telegram offers end-to-end encryption in voice and video calls, and optionally in private chats if both...
218 KB (19,559 words) - 15:23, 2 August 2025
an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users...
21 KB (2,561 words) - 15:00, 24 May 2025
with a focus on security and privacy that offers OpenPGP based end-to-end encryption and digital signatures for usage in emails. It was launched in November...
5 KB (323 words) - 17:49, 19 March 2025
cryptography upgrade to the Diffie–Hellman key exchange. It is notably being incorporated into the Signal Protocol, an end-to-end encryption protocol. In September...
3 KB (266 words) - 22:37, 29 September 2024
encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme...
34 KB (3,645 words) - 19:23, 28 July 2025
Rich Communication Services (category End-to-end encryption)
connected to the global RCS network, and additionally was the first to offer end-to-end encryption over RCS. End to end encryption using MLS was added to the...
109 KB (8,211 words) - 13:56, 30 July 2025
End-to-end auditable or end-to-end voter verifiable (E2E) systems are voting systems with stringent integrity properties and strong tamper resistance....
25 KB (2,760 words) - 20:06, 18 June 2025
Public-key cryptography (redirect from Asymmetric key encryption algorithm)
Diffie–Hellman key exchange, public-key key encapsulation, and public-key encryption. Public key algorithms are fundamental security primitives in modern cryptosystems...
40 KB (4,551 words) - 23:23, 28 July 2025
messaging client implementing the Matrix protocol. Element supports end-to-end encryption, private and public groups, sharing of files between users, voice...
19 KB (1,193 words) - 12:49, 21 July 2025
through measures like end-to-end encryption for messages, mandatory two-factor authentication based on a word list, and the encryption of sensitive data....
4 KB (415 words) - 22:39, 12 June 2025
Peerio (section End-to-End Encryption)
Messages and user files stored on the Peerio cloud were protected by end-to-end encryption, meaning the data was encrypted in a way that could not be read...
10 KB (920 words) - 02:43, 8 June 2025