- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
Kohler, the makers of a smart toilet camera, can access customers’ data stored on its servers, and can use customers’ bowl pictures to train AI.
Kohler, the makers of a smart toilet camera, can access customers’ data stored on its servers, and can use customers’ bowl pictures to train AI.
if Kohler is the other end of your transmission, and the data is encrypted til they decrypt it, it’s e2ee. if you disagree, try explaining why.
Because that’s plainly not what end to end encrypted means. That’s just HTTPS.
They’re providing the service. End to end encryption maintains an encrypted communication channel between two clients that the service provider cannot decrypt.
By your definition, all HTTPS traffic would be end to end encrypted.
The term “end to end encryption” is just not applicable to this context and using it as marketting to users in order to give them a false sense of security is disingenous.
Waiting for the first leaked celebrity poop.
yes. it is.
From the perspective of the Kohler toilet camera being the sender and the Kohler shit-reviewing service being the recipient, TLS can technically be end-to-end encryption. As long as the shit-reviewing server is doing the TLS termination itself—and not Cloudflare or a reverse proxy—that meets the definition insofar as only the two communicating parties having the ability to see the cleartext. That’s assuming the server has disk encryption and no employee has access to it while the disk is unlocked.
Kohler calling it E2EE is still disingenuous as fuck regardless of my above hypothetical, however.
Again, nope. Not what end to end encryption means. That’s just HTTPS.