"Encrypted". Emphasis on *transport cryptography! Signal etc mesages can be found in phone memory even after reboot. Someone should really hold a crash course on how to crypto on your devices from FS to messdate data over IP works:
*It's not your crypto, but a bunch of others, (strangers, dangers) people's crypto who's __word__ you accept for Gospel (trust us, we know best!:) Not to mention if your packets have reached correct end point and not one the CA just says it the expected one__!*<p>* You blindly trust a daisy chain of stranger's word that their code and their CA and they themselves are uncrackable & secure. Would you trust strangers insisting on being all in your secure bits?<p>* Most industry CA based. hardware does not disclose vulnerablities or noice that patches are incoming t the end user, they secretley fix after their lients, your servivce provder typically, has beengiven advisories. Those rarely are givenn to the en dus,t he customer, because of NDA or even lazyness, security by obscurity incomeptence etc.<p>Smart device encryption is an illusion where your trust strangers with legal/financial or Intel motives to betray it, but call strangers fancy names like CA, ROot of Trust, etc.<p>The entire ecosystem of trust based device security crypto is to ensure their access to your daa, securely. Not to secure your data from them or the OEM, and TLS padlocks simply means the CA told your app whtever certificate pres4ented is the right one, green lighting you and that endpoint to negotiatie encryption, so for all you know you aor your app could be negotating encryption with the US FBI or $APT.<p>* CAs do get compromised by attacker, nation states & researchers,, encryption standards do get backdoored, with weak implementations or even kleptographic ones.<p>q: Why is the US FBI causing panic about suppposed chinese hacking isntead of contacting us service provides who can enable 4g / LTE IPSEC transport, supported by all certified handsets and USIM, yiuelding telecom network infratrcture acccess a moot point since ipsec tunnel is from you to your service provider and their end point.<p>A: You are victims of on-going psyop conditioninig you to trust blindly!<p>Do not fall for the temptation: Every part of the daisy chain of trust providers have insentives to screw you over at their whim...and then there is all the code they + you rely on to bootstrap that daisy chain of naive trust..