The article is hand-wavingly vague — but even if they can intercept, e2e should render it useless. Thus, the implication is that they have some ability to render e2e pointless by being able to access the phone by other means. Thoughts?
I think an open admission that they are capable of this, by someone who is in a position to know, is pretty uncommon.<p>We still have so far to go when it comes to real computer security.