End-to-end security does not require identical endpoints
I hesitated even in linking to this preposterous article. But its definition of ‘end-to-end’ encryption as requiring ‘identical endpoints’ is not one I’ve seen before (and my PhD title literally includes the phrase!)
Continue reading
Recent Comments