What is end-to-end encryption?

Junaid Mehar
4 min readJan 10, 2022

--

This is the perfect feature for protected and safe communication. Encrypted or coded messages can only be accessed by the sender and receiver and third-party interferences such as through hackers are minimized. This secures the messages when they are sent and only decrypts them once they arrive at the receiver’s device. Several messaging apps use end-to-end encryption such as Whatsapp, telegram, and Signal.

KalamTime, the instant messaging app prioritizes secure communication with your friends and family. It employs state-of-the-art encryption technology to ensure that apart from you and the person your correspondent no one else is able to read your texts or listen to your calls and voice messages. Not even KalamTime can transgress this boundary.

How is Encryption-In-Transit different from End-to-End Encryption?

Encryption-In-Transit

The message on your device will be encrypted or encoded when it is sent to the server. It will be decrypted for processing and then re-encrypted when reaching its receiver. This means the information is encrypted anytime it is in transit and decrypted when it is at rest. This protects users’ personal data from the most vulnerable stage — in transit — where hackers and unwanted members can intercede and steal information.

End-to-End Encryption

In contrast to the above-mentioned more traditional system, end-to-end encryption doesn’t decrypt data until it has reached the final destination — to the receiver. Therefore, not even the messaging service can become aware of the sender’s message when it passes through the server. This gives the user complete confidentiality of their information which includes texts, financial transactions, or business proceedings.

Services like Google, Yahoo, and Microsoft use Encryption-In-Transit and through decryption keys, they can have access to the users’ data on their servers. They can read the users’ emails and files. Particularly Google shows its account holder targeted ads due to the information it can read.

Advantages of End-to-End Encryption

The pros of end-to-end encryption are numerous and preferred over ‘cleartext’ (when messages or data are sent without any encryption at all) or encryption-in-transit.

1.) Makes sure your data is secure from hackers

Data at the server will not be read by unwanted individuals since only you will possess the key to decrypt your coded message.

2.) Protects your privacy

Unlike Google and Microsoft where data is read at the servers, end-to-end encryption is completely against this technique. Hence, no third party will be able to extract your data at servers through cyber theft.

3.) Admins remain safe

As admins don’t have any decryption keys to decipher the data, any attack against administration will be a failed attempt.

Disadvantages of End-to-End Encryption

1.) Offering additional features becomes troublesome

When an app’s communication is fully end-to-end encrypted, the app won’t be able to allow contextual services based on content of the message such as sending calendar invites, setting alarms or reminders automatically. The data will be completely inaccessible to anyone except the user and receiver, which is not ideal in all situations.

2.) Limited security

The safe policies that end-to-end encryption announces confidently may still have pitfalls and loopholes. If another party gains physical access of either device at the sending or receiving end, they will be able to obtain the information and even direct new messages. Hence, one must always protect their devices using passwords, passcodes or biometrics.

3.) Metadata is still invisible

Even if end-to-end encryption is fully vigilant of not permitting anyone from acquiring information about the contents of your data be it the government or law advocates, the metadata may not be encrypted. Therefore, it is still able to tell who the messages were sent to and at what time despite the data being encrypted or hidden.

Best Encrypted Messaging Apps

Signal

This application developed by Open Whisper System requires the user to register their phone number to make a signal account. The rest of your data such as name or profile icon are end-to-end encrypted. The texts and video calls are also end-to-end encrypted and can be set to be deleted as per your choice. Interestingly, this app doesn’t store either the meta-data and only needs the very necessary super technical information needed for the app to function properly. It also has the feature to automatically blur the photos taken by this app.

Viber

This app was developed by the Japanese company Rakuten and has end-to-end encrypted personal and group by default. It does the same for video calls. Chats can be made to self-destruct and although viber has similar encryption concepts like signal, the former’s code is private. To make an account your contact number and email are required which viber then stores. It also stores any information regarding your activity on the app. It stores the meta-data such as who was the sender and receiver of texts or calls and at what time.

Telegram

This messaging service by Russian entrepreneur Pavel Durov, allows end-to-end encryption but not by default. To protect your data you need to enable ‘secret chats’ which don’t allow servers to be aware of your data and are also supportive of self-destructive messages. Telegram’s code, just like signal, is open-source. Your phone number and other basic data for making an account are registered by Telegram.

--

--