Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Developer confirms Crimson Desert will have no post-launch microtransactions

    Cheap gaming handheld: Mangmi Pocket Max with AMOLED reviewed

    MagicX reveals color options for its two new handhelds

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Metaplanet Reports FY2025 Results as Bitcoin Unrealized Losses Top $1 Billion

      February 17, 2026

      Crypto’s AI Pivot: Hype, Infrastructure, and a Two-Year Countdown

      February 17, 2026

      The RWA War: Stablecoins, Speed, and Control

      February 17, 2026

      Jeffrey Epstein Emails Show Plans to Meet Gary Gensler To Talk Crypto

      February 17, 2026

      Bitcoin Bounce Fades, Q1 Losses Deepen, and New Price Risk Back in Focus

      February 17, 2026
    • Technology

      Developer confirms Crimson Desert will have no post-launch microtransactions

      February 17, 2026

      Cheap gaming handheld: Mangmi Pocket Max with AMOLED reviewed

      February 17, 2026

      MagicX reveals color options for its two new handhelds

      February 17, 2026

      New Casio G-Shock metal bezel watches with red display coming to more countries

      February 17, 2026

      MSI’s $5,090 RTX 5090 Lightning Z cracks from thermal shock during 2,500W BIOS test

      February 17, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Google unveils end-to-end messages for Gmail. Only thing is: It’s not true E2EE.
    Technology

    Google unveils end-to-end messages for Gmail. Only thing is: It’s not true E2EE.

    TechAiVerseBy TechAiVerseApril 4, 2025No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Google unveils end-to-end messages for Gmail. Only thing is: It’s not true E2EE.
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Google unveils end-to-end messages for Gmail. Only thing is: It’s not true E2EE.


    Skip to content

    Yes, encryption/decryption occurs on end-user devices, but there’s a catch.

    When Google announced Tuesday that end-to-end encrypted messages were coming to Gmail for business users, some people balked, noting it wasn’t true E2EE as the term is known in privacy and security circles. Others wondered precisely how it works under the hood. Here’s a description of what the new service does and doesn’t do, as well as some of the basic security that underpins it.

    When Google uses the term E2EE in this context, it means that an email is encrypted inside Chrome, Firefox, or just about any other browser the sender chooses. As the message makes its way to its destination, it remains encrypted and can’t be decrypted until it arrives at its final destination, when it’s decrypted in the recipient’s browser.

    Giving S/MIME the heave-ho

    The chief selling point of this new service is that it allows government agencies and the businesses that work with them to comply with a raft of security and privacy regulations and at the same time eliminates the massive headaches that have traditionally plagued anyone deploying such regulation-compliant email systems. Up to now, the most common means has been S/MIME, a standard so complex and painful that only the bravest and most well-resourced organizations tend to implement it.

    S/MIME requires each sender and receiver to have an X.509 certificate that’s been issued by a certificate authority. Obtaining, distributing, and managing these certificates in a secure manner takes time, money, and coordination. That means that if Bob and Alice have never worked together before and an urgent or unexpected need arises for him to send Alice an encrypted message promptly, they’re out of luck until an admin applies for a certificate and sees that it’s installed on Alice’s machine—so much for flexibility and agility.

    Google says that E2EE Gmail abstracts away this complexity. Instead, Bob drafts an email to Alice, clicks a button that turns on the feature, and hits send. Bob’s browser encrypts the message, and sends it to Alice. The message decrypts only after it arrives in Alice’s browser and she authenticates herself.

    To make this happen, Bob’s organization deploys what Google says is a lightweight key server, known as a KACL, short for a key access control list. This server, which can be hosted on premises or most cloud services, is where keys are generated and stored. When Bob sends an encrypted message, his browser connects to the key server and obtains an ephemeral symmetric encryption key. Bob’s browser encrypts the message and sends it to Alice, along with a reference key. Alice’s browser uses the reference key to download the symmetric key from the KACL and decrypts the message. The key is then deleted.

    To prevent Mallory or another adversary-in-the-middle from obtaining the key, Alice must first authenticate herself through Okta, Ping, or whatever other identity provider, or IDP, Bob’s organization uses. If this is the first time Alice has received a message from Bob’s organization, she will first have to prove to the IDP that she has control of her email address. If Alice plans to receive encrypted emails from Bob’s organization in the future, Alice sets up an account that can be used going forward.

    Bob’s organization can add an additional layer of protection by requiring Alice to already have an account on the IDP and authenticate herself through it.

    “The idea is that no matter what, at no time and in no way does Gmail ever have the real key. Never,” Julien Duplant, a Google Workspace product manager, told Ars. “And we never have the decrypted content. It’s only happening on that user’s device.”

    Now, as to whether this constitutes true E2EE, it likely doesn’t, at least under stricter definitions that are commonly used. To purists, E2EE means that only the sender and the recipient have the means necessary to encrypt and decrypt the message. That’s not the case here, since the people inside Bob’s organization who deployed and manage the KACL have true custody of the key.

    In other words, the actual encryption and decryption process occurs on the end-user devices, not on the organization’s server or anywhere else in between. That’s the part that Google says is E2EE. The keys, however, are managed by Bob’s organization. Admins with full access can snoop on the communications at any time.

    The mechanism making all of this possible is what Google calls CSE, short for client-side encryption. It provides a simple programming interface that streamlines the process. Until now, CSE worked only with S/MIME. What’s new here is a mechanism for securely sharing a symmetric key between Bob’s organization and Alice or anyone else Bob wants to email.

    The new feature is of potential value to organizations that must comply with onerous regulations mandating end-to-end encryption. It most definitely isn’t suitable for consumers or anyone who wants sole control over the messages they send. Privacy advocates, take note.

    Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.



    37 Comments

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleBonobos’ calls may be the closest thing to animal language we’ve seen
    Next Article DeepMind has detailed all the ways AGI could wreck the world
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Developer confirms Crimson Desert will have no post-launch microtransactions

    February 17, 2026

    Cheap gaming handheld: Mangmi Pocket Max with AMOLED reviewed

    February 17, 2026

    MagicX reveals color options for its two new handhelds

    February 17, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025682 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025265 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025155 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025114 Views
    Don't Miss
    Technology February 17, 2026

    Developer confirms Crimson Desert will have no post-launch microtransactions

    Developer confirms Crimson Desert will have no post-launch microtransactions – NotebookCheck.net News ⓘ steamCrimson Desert’s…

    Cheap gaming handheld: Mangmi Pocket Max with AMOLED reviewed

    MagicX reveals color options for its two new handhelds

    New Casio G-Shock metal bezel watches with red display coming to more countries

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Developer confirms Crimson Desert will have no post-launch microtransactions

    February 17, 20262 Views

    Cheap gaming handheld: Mangmi Pocket Max with AMOLED reviewed

    February 17, 20263 Views

    MagicX reveals color options for its two new handhelds

    February 17, 20263 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.