Lynette Miles

There are significant challenges in implementation of E2EE protocols, from who handles the security, to ensuring all participants can access the same data. E2E encryption introduced lots of challenges for history snapshots and what it means for Tombstones. Multiple types of encryption: local, using keys, and end to end all have different implementations and implications when using a collaborative app - especially a decentralized one.

Lynette Miles

In today’s electronically driven communication world, data security is no small matter. What’s safe? Who do you trust? Who else can access your data, and do you even know who those people or companies are selling it to?