Solid Identity Security for End-to-End Encryption
“Is Your Chat Peer-to-Peer and End-to-End Encrypted?” https://www.linkedin.com/pulse/your-chat-peer-to-peer-end-to-end-encrypted-debesh-choudhury-phd
Debesh Choudhury, PhD Thanks for referring me to this informative article. As you emphasize, End-to-End Encryption does help a lot.
I would add that it is still half of the story — The security that cryptography provides is not above the identity security of the people who handle a decryption key.
One of the methods to effectively protect the decryption key is getting non-existent keys re-generated on-the-fly from operators’ non-volatile episodic memory, say, image memory of citizens’ pleasant personal experiences as discussed in “Non-Existent Crypto Keys to be Regenerated from Image Memory when Needed” (8Sep2023) https://www.linkedin.com/posts/hitoshikokumai_microsoft-explains-how-china-stole-one-of-activity-7105818025685106688-bYVs