148
this post was submitted on 03 Dec 2025
148 points (100.0% liked)
Pulse of Truth
1753 readers
268 users here now
Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).
This community is automagically fed by an instance of Dittybopper.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
if Kohler is the other end of your transmission, and the data is encrypted til they decrypt it, it's e2ee. if you disagree, try explaining why.
Because that's plainly not what end to end encrypted means. That's just HTTPS.
They're providing the service. End to end encryption maintains an encrypted communication channel between two clients that the service provider cannot decrypt.
By your definition, all HTTPS traffic would be end to end encrypted.
The term "end to end encryption" is just not applicable to this context and using it as marketting to users in order to give them a false sense of security is disingenous.
From the perspective of the Kohler toilet camera being the sender and the Kohler shit-reviewing service being the recipient, TLS can technically be end-to-end encryption. As long as the shit-reviewing server is doing the TLS termination itself—and not Cloudflare or a reverse proxy—that meets the definition insofar as only the two communicating parties having the ability to see the cleartext. That's assuming the server has disk encryption and no employee has access to it while the disk is unlocked.
Kohler calling it E2EE is still disingenuous as fuck regardless of my above hypothetical, however.
Again, nope. Not what end to end encryption means. That's just HTTPS.