End-to-end encryption

Control access

Someone encrypts data so it can only be decrypted by the intended person. This often uses public key cryptography.

Examples

  • PGP: encryption software for email

  • Signal: messaging app with end-to-end encryption

  • Keybase: directory of public keys, used to encrypt messages to specific people

Further reading

Related patterns