All indications are this is not truly end to end. If it get's encrypted or needs any third piece of equipment, then encryption can be completely ignored by those that use the 3rd party equipment.
Not a member of The Register?
Create a new account
Remember me on this computer?
The Register - Independent news and views for the tech community. Part of Situation Publishing
Join our daily or weekly newsletters, subscribe to a specific section or set News alerts
Biting the hand that feeds IT © 1998–2019