Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Out of curiosity, how can end-to-end encryption be verified when both the clients and the servers are closed-source?



How can you know it’s not E2EE? The absence of evidence is not the evidence of absence, or something like that.

I agree that closed source is harder to verify, but that’s not the same as insecure.


If you can't verify your messages are E2EE, you have to trust the vendor. But if you trust the vendor, you don't need E2EE to begin with.


There are other threat actors than the vendor looking to compromise the confidentiality of your message.


Those actors don't have the vendor's encryption keys.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: