Concept talk:End-to-end encryption

Nothing to hide, but nothing to show you either.
Latest comment: 3 years ago by 21x
Jump to navigation Jump to search

Purpose of the key exchange section[edit | edit source]

Re: Special:Diff/5240 summary comment
@Nbartram:The purpose of the section is to illustrate to the reader how you can transition from asymmetric to symmetric crypto, and how E2EE is fundamentally just a mathematical method, and just like any mathematical method, you can't exactly prevent people from using it.
The whole example is meant to illustrate how the basic concepts behind E2EE are relatively simple. Seems to me that most people trying to engage in explaining the E2EE vs law enforcement conflict either go into mathematical weeds or just tell the reader 'can't be done, just trust us'. From where I'm standing, the best argument against backdooring E2EE is to have some understanding of the E2EE principles, and I think that is possible to bring across even to a reader who has little to no tech or mathematical background. 21x (talk) 17:08, 17 September 2020 (UTC)Reply[reply]