You can probably get a better explanation by reading up on encryption, but I think most security people would say that encrypted communications where you don’t hold the keys may as well not be encrypted at all. You still have to trust that someone doesn’t (accidentally or deliberately) access your data, leak your keys, or otherwise break the process that keeps everything safe.
You can probably get a better explanation by reading up on encryption, but I think most security people would say that encrypted communications where you don’t hold the keys may as well not be encrypted at all. You still have to trust that someone doesn’t (accidentally or deliberately) access your data, leak your keys, or otherwise break the process that keeps everything safe.
Fair enough. I will try to read more stuff about encryption.