• Shows that the only true end to end encryption is when the sender and recipient do the encrypting/decrypting locally. Even then, it requires both ends not to be compromised.