End to End Encryption

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:59 PM on 5/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

5 Terms

1
New cards

In most systems, a central server relays messages between users. A secure connection is usually established between a user and the central server, which can thus see all user messages.

A protocol providing end-to-end encryption encrypts communications from one user up to its intended recipient, preventing any server in the middle from observing messages in cleartext.

2
New cards

Effectively, these MITM servers sit in between users, are necessary for the

application to function, and are trusted third parties of the protocol. That is to

say,

we have to trust these parts of the system in order for the protocol to be

considered secure

3
New cards

Even if traffic is encrypted, some middleboxes are set up to end the TLS connection

(we say that they terminate TLS) and either forward the traffic in clear from that point on or start another TLS connection with the next hop.

4
New cards

TLS termination is sometimes done for “good” reasons: to better filter traffic, balance connections geographically or within a data center, and so on.

This adds to the attack surface as traffic is now visible in the clear in more places.

5
New cards

Sometimes, TLS termination is done for “bad” reasons:

to intercept, record, and spy on traffic.