

5·
6 days agoI don’t think it can be called End to End Encryption if it is actually End to End and The guy in the Middle.
Every technical definition of End to End Encryption states only the Sender and Recipient have keys to decrypt the message.
Anything else is using “End to End Encryption” purely as a marketing term like “Lite” or “Pure”.
Yep, If they can access messages that are deleted from your device, then they have the keys.