{"id":3999,"date":"2020-11-06T10:45:47","date_gmt":"2020-11-06T08:45:47","guid":{"rendered":"https:\/\/www.epikshare.com\/blog\/news\/what-is-e2ee-and-what-is-it-not\/"},"modified":"2020-11-06T10:45:47","modified_gmt":"2020-11-06T08:45:47","slug":"what-is-e2ee-and-what-is-it-not","status":"publish","type":"post","link":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/","title":{"rendered":"What is E2EE &#8211; and what is it not?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3999\" class=\"elementor elementor-3999 elementor-3966\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-30c9b01 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"30c9b01\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f84b9f5\" data-id=\"f84b9f5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9467e8b elementor-widget elementor-widget-text-editor\" data-id=\"9467e8b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Not only since the success of messenger services such as Telegram, Threema &amp; Co. has end-to-end encryption (E2EE) been on everyone&#8217;s lips. For many, E2EE is synonymous with the secure exchange of data and messages over the Internet. In fact, E2EE offers a high level of security. However, users should keep a few things in mind. Which these are we&#8217;ll clarify in this blog.<\/strong> <\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4054405 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4054405\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bc8412d\" data-id=\"bc8412d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05aed00 elementor-widget elementor-widget-heading\" data-id=\"05aed00\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">E2EE - How it works<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8870c8 elementor-widget elementor-widget-text-editor\" data-id=\"b8870c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With end-to-end encryption, the data to be sent is encrypted directly on the sender&#8217;s system or device and decrypted again at the recipient&#8217;s end. In between, nobody is able to read the data or manipulate it in any way. This is achieved with the help of so-called cryptographic keys, which are stored exclusively on the two end devices. This way, only both devices know how to handle the data. Therefore, even if an unauthorized third party intercepts the data, they would not be able to do anything with it because they lack the corresponding key.<\/p>\n<p>With current computing power and known algorithms, end-to-end encryption is considered unbreakable. It is one of the most secure encryption methods in the world, not even the provider of an E2EE solution has access to the security keys.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-604673b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"604673b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a7d8f78\" data-id=\"a7d8f78\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee04d85 elementor-widget elementor-widget-heading\" data-id=\"ee04d85\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">End-to-end encryption is more secure than TLS or SSL<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bade49e elementor-widget elementor-widget-text-editor\" data-id=\"bade49e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In connection with secure e-mail transmission, many people ask themselves &#8220;I send my mails via a Transport Layer Security Protocol (TLS). Why should I still use end-to-end encryption now?&#8221; This thought is obvious, since TLS also sends encrypted mails. However, TLS only provides encryption between each individual user and the respective service provider. This means that the provider has access to the decrypted data, at least theoretically, before sending it back encrypted to the recipient.<\/p>\n<p>The same is true for SSL or access to websites via HTTPS: in this case, too, the data is encrypted on its way from the client to the server. However, the encryption ends at the server itself &#8211; and can then theoretically be read in decoded form. This difference is especially important when you want to send data via common cloud solutions such as Dropbox &amp; Co. that do not offer end-to-end encryption. This is because in this case, cloud providers can read the data unencrypted, despite encrypted data transmission via SSL. With E2EE, however, you can be sure that the encryption is really only lifted at the intended recipient &#8211; without the provider or any other third party gaining access to the decrypted data.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d68f21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d68f21\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-715c132\" data-id=\"715c132\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e98a298 elementor-widget elementor-widget-heading\" data-id=\"e98a298\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">E2EE is not an all-encompassing security solution<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f86efbc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f86efbc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4862839\" data-id=\"4862839\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5613cb9 elementor-widget elementor-widget-text-editor\" data-id=\"5613cb9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>End-to-end encryption protects data from unauthorized access on the way from one end device to another. However, if unauthorized third parties have already gained access to one or both end devices, the data is no longer secure. End-to-end encryption cannot replace security mechanisms that protect the end devices themselves from unauthorized access.<\/p>\n<p>A man-in-the-middle attack is also theoretically possible with end-to-end encryption, for example, when unauthorized third parties plant their own public key on the sender so that the data can be encoded with a key known to them.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-452703e\" data-id=\"452703e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4cca35 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"f4cca35\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/epiKshare_blog_e2ee-1024x683.jpg\" class=\"attachment-large size-large wp-image-3976\" alt=\"\" srcset=\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/epiKshare_blog_e2ee-1024x683.jpg 1024w, https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/epiKshare_blog_e2ee-300x200.jpg 300w, https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/epiKshare_blog_e2ee-768x512.jpg 768w, https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/epiKshare_blog_e2ee.jpg 1080w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">End-to-end encryption (E2EE) ensures that no one can read your communication - you still have to take care of protected end devices.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8c0548 elementor-widget elementor-widget-text-editor\" data-id=\"f8c0548\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In such a case, documents that have already been sent cannot be read, but new ones can be read. However, such an attack is usually quickly noticed, since the original recipient key usually has to be exchanged and the actual recipient does not have access to the newly sent data.<br \/>In another scenario, cybercriminals can bypass the cracking of the security key completely if they succeed in compromising one of the end devices &#8211; then they can easily access the data before encryption or after decryption. The assumption that E2EE keeps it secret who you are communicating with is also a fallacy. The encryption keeps the content of your communication confidential and inaccessible to third parties. However, in order for the servers to know who is to receive which message, your e-mail also contains so-called meta data. This can be, for example, your IP address, information on date and time or even device information. This meta data may be encrypted on the way from you TO the server, but usually not ON the server.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cdb2dcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cdb2dcf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d19ca0a\" data-id=\"d19ca0a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49ab54a elementor-widget elementor-widget-heading\" data-id=\"49ab54a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Usability is a key factor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c03cf8 elementor-widget elementor-widget-text-editor\" data-id=\"5c03cf8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of the reasons why end-to-end encryption has been so late in becoming established, especially for sending e-mails, is that the implementation and use of the technology is often not very easy. However, the simple use of E2EE is a basic prerequisite for employees in companies to use it consistently for secure communication. If it is too complicated to use, employees will regularly forego end-to-end encryption or find other workarounds. Companies should therefore ensure that the use of E2EE does not present users with too many obstacles. Fortunately, there are a number of solutions on the market today, such as epiKshare, that make secure end-to-end encrypted mail delivery simple and straightforward.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8f1011 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8f1011\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c9dd6e\" data-id=\"4c9dd6e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-765273c elementor-widget elementor-widget-heading\" data-id=\"765273c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure mail sharing with epiKshare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b83242 elementor-widget elementor-widget-text-editor\" data-id=\"2b83242\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The secure sending of e-mails with end-to-end encryption is a basic component of the epiKshare suite. Without having to resort to additional certificates that are subject to a fee, epiKshare allows you to encrypt your data using the particularly secure AES-256 algorithm and send it directly from Outlook via your epiKcloud. Handling is particularly easy, as the encryption is simply controlled by the user and executed via the web browser. Encrypted files can also be made available to external users at a later date &#8211; the encryption keys are simply dynamically adjusted in the background.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-dce-background-color=\"#E1E1E1\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3ee8eec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ee8eec\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d94d019\" data-id=\"d94d019\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f51d842 elementor-widget elementor-widget-text-editor\" data-id=\"f51d842\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For more information on end-to-end encryption with epiKshare, please visit https:\/\/www.epikshare.com\/epikware\/epikryption\/<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Not only since the success of messenger services such as Telegram, Threema &#038; Co. has end-to-end encryption (E2EE) been on everyone&#8217;s lips. For many, E2EE is synonymous with the secure exchange of data and messages over the Internet. In fact, E2EE offers a high level of security. However, users should keep a few things in mind. Which these are we&#8217;ll clarify in this blog. <\/p>\n","protected":false},"author":4,"featured_media":3987,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-3999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-professional-article"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.4 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is E2EE - and what is it not? - epiKshare<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is E2EE - and what is it not?\" \/>\n<meta property=\"og:description\" content=\"Not only since the success of messenger services such as Telegram, Threema &amp; Co. has end-to-end encryption (E2EE) been on everyone&#039;s lips. For many, E2EE is synonymous with the secure exchange of data and messages over the Internet. In fact, E2EE offers a high level of security. However, users should keep a few things in mind. Which these are we&#039;ll clarify in this blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/\" \/>\n<meta property=\"og:site_name\" content=\"epiKshare\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-06T08:45:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1399\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Niko Berger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Niko Berger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/\"},\"author\":{\"name\":\"Niko Berger\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/28884ca1644aa677993bf2a9733a316e\"},\"headline\":\"What is E2EE &#8211; and what is it not?\",\"datePublished\":\"2020-11-06T08:45:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/\"},\"wordCount\":960,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg\",\"articleSection\":[\"Professional Article\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/\",\"url\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/\",\"name\":\"What is E2EE - and what is it not? - epiKshare\",\"isPartOf\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg\",\"datePublished\":\"2020-11-06T08:45:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#primaryimage\",\"url\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg\",\"contentUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg\",\"width\":2000,\"height\":1399},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.epikshare.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is E2EE &#8211; and what is it not?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#website\",\"url\":\"https:\/\/www.epikshare.com\/en\/\",\"name\":\"epiKshare\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.epikshare.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#organization\",\"name\":\"epiKshare GmbH\",\"url\":\"https:\/\/www.epikshare.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/logo_epik_2.png\",\"contentUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/logo_epik_2.png\",\"width\":222,\"height\":50,\"caption\":\"epiKshare GmbH\"},\"image\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/28884ca1644aa677993bf2a9733a316e\",\"name\":\"Niko Berger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/Niko_Portrait-150x150.jpg\",\"contentUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/Niko_Portrait-150x150.jpg\",\"caption\":\"Niko Berger\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is E2EE - and what is it not? - epiKshare","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/","og_locale":"en_US","og_type":"article","og_title":"What is E2EE - and what is it not?","og_description":"Not only since the success of messenger services such as Telegram, Threema & Co. has end-to-end encryption (E2EE) been on everyone's lips. For many, E2EE is synonymous with the secure exchange of data and messages over the Internet. In fact, E2EE offers a high level of security. However, users should keep a few things in mind. Which these are we'll clarify in this blog.","og_url":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/","og_site_name":"epiKshare","article_published_time":"2020-11-06T08:45:47+00:00","og_image":[{"width":2000,"height":1399,"url":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg","type":"image\/jpeg"}],"author":"Niko Berger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Niko Berger","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#article","isPartOf":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/"},"author":{"name":"Niko Berger","@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/28884ca1644aa677993bf2a9733a316e"},"headline":"What is E2EE &#8211; and what is it not?","datePublished":"2020-11-06T08:45:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/"},"wordCount":960,"commentCount":0,"publisher":{"@id":"https:\/\/www.epikshare.com\/en\/#organization"},"image":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#primaryimage"},"thumbnailUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg","articleSection":["Professional Article"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/","url":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/","name":"What is E2EE - and what is it not? - epiKshare","isPartOf":{"@id":"https:\/\/www.epikshare.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#primaryimage"},"image":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#primaryimage"},"thumbnailUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg","datePublished":"2020-11-06T08:45:47+00:00","breadcrumb":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#primaryimage","url":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg","contentUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/11\/E2EE_epikShare-1.jpg","width":2000,"height":1399},{"@type":"BreadcrumbList","@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/what-is-e2ee-and-what-is-it-not\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.epikshare.com\/en\/"},{"@type":"ListItem","position":2,"name":"What is E2EE &#8211; and what is it not?"}]},{"@type":"WebSite","@id":"https:\/\/www.epikshare.com\/en\/#website","url":"https:\/\/www.epikshare.com\/en\/","name":"epiKshare","description":"","publisher":{"@id":"https:\/\/www.epikshare.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.epikshare.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.epikshare.com\/en\/#organization","name":"epiKshare GmbH","url":"https:\/\/www.epikshare.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/logo_epik_2.png","contentUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/logo_epik_2.png","width":222,"height":50,"caption":"epiKshare GmbH"},"image":{"@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/28884ca1644aa677993bf2a9733a316e","name":"Niko Berger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/Niko_Portrait-150x150.jpg","contentUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/Niko_Portrait-150x150.jpg","caption":"Niko Berger"}}]}},"_links":{"self":[{"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/posts\/3999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/comments?post=3999"}],"version-history":[{"count":0,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/posts\/3999\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/media\/3987"}],"wp:attachment":[{"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/media?parent=3999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/categories?post=3999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/tags?post=3999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}