If someone is going to tap into my email communications they are much more likely to do it at the weakest point, that is either my equipment (phone or computer) or the other party's equipment. If someone is able to compromise my equipment they can record all my I/O, and it doesn't matter if what I type goes into Gmail or into some E2E encrypted service.
|