http://isdb4l77sjqoy2qq7ipum6x3at6hyn3jmxfx4zdhc72ufbmuq4ilwkqd.onion/docs/glossary.html
End-to-end encryption requires agreeing cryptographic keys between the sender and the recipient in a way that no eavesdroppers can access the agreed keys. See key agreement protocol . This key exchange can be compromised via man-in-the-middle attack , particularly if key exchange happens via the same communication provider and no out-of-band channel is used to verify key exchange.