Or, if you do want to do illegal shit over unencrypted forms of communication, use your own encryption layer on top, so you can actually be 100 % sure that there’s real E2EE. This is the way e-mail encryption was meant to work, before someone added TLS to the “standard” and everyone thought it’s OK as they trust the e-mail service provider.
Or, if you do want to do illegal shit over unencrypted forms of communication, use your own encryption layer on top, so you can actually be 100 % sure that there’s real E2EE. This is the way e-mail encryption was meant to work, before someone added TLS to the “standard” and everyone thought it’s OK as they trust the e-mail service provider.