End-to-End Encryption

This process involves using communications encryption to make information unavailable to third parties. When being passed through a network, the information will only be available to the sender and the receiver, preventing ISPs or application service providers from discovering or tampering with the content of the communication.