26 February 2026
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
We’ve had a pretty good couple of years when it comes to messaging security. Initially, adopting encryption stopped passive surveillance. Later, adoption of end-to-end encryption by the dominant platforms gave us much needed privacy. Some platforms, such as Apple and Signal, even led the way when it comes to resilience against cryptographically relevant quantum computers. Compare this situation to the poor state of email encryption, and the difference is like night and day. Despite this, some structural problems remain, and we’re even in danger of regressing.
At a glance, end-to-end encryption (E2EE) is widely available, but if we look closely, we see many gaps:
We are, unfortunately, in a place where we cannot rely on native platform messaging for secure communication. Interoperability can probably be fixed, at least between Apple and Google. Apple is currently working on implementing the latest Rich Communication Services (RCS) standard that comes with E2EE based on the MLS standard (RFC 9420). To achieve interoperable end-to-end security, we’d also need Apple to change its stance on encrypting backups.
However, it’s the centralized implementation of messaging that represents the biggest problem. It’s a huge and defining structural issue. The centralization puts valuable messages in the hands of the vendors and makes them a very juicy target; they are in the crosshairs of commercial entities, legislators, law enforcement, and interest groups. None of them can be trusted when it comes to privacy. So we have a problem: The centralized implementations have made it possible to innovate and improve quickly, but they’ve also become chokepoints that can lead to breaking security for everyone at a stroke.
Even in the best case, where the encryption is left alone and by some miracle there are no backdoors, the fact that the metadata is concentrated in a few locations is a substantial problem.
Signal is the best option if you want reliable security, but the platform is not popular enough; good luck convincing every one of your friends to use it. Signal also has the problem of being run by only one entity. On the positive side, its clients are open source, and there is even a reproducible build for Android. This goes a long way toward transparency. The other platforms have to be continuously reverse engineered, which is a much more demanding effort.
There isn’t going to be an easy way out of this situation. No one has been able to build a robust, usable, and widely adopted E2EE solution for messaging. It’s a significant challenge, and many with smaller ambitions have failed as well. Is the current compromise and constant battle among the conflicting pulling forces the best we can do?
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.