Dec. 3, 2019

Globally, intelligence and law enforcement agencies are arguing that end-to-end encryption makes it much harder to track terrorists, pedophiles and human traffickers as it makes it nearly impossible for them to get access to people’s digital communications.


  • End-to-end encryption takes place on either end of a communication. A message is encrypted on a sender’s device, sent to the recipient’s device in an unreadable format, then decoded for the recipient.

  • For doing this, a program on your device mathematically generates two cryptographic keys — a public key and a private key.

  • The public key can be shared with anyone who wants to encrypt a message to you. The private key, or secret key, decrypts messages sent to you and never leaves your device.