Understanding End-to-End Encryption in Simple Terms
Someone recently asked me: 'WhatsApp says my messages are encrypted. Does that mean nobody can read them? Not even WhatsApp?' The answer is surprisingly interesting, and it affects every single message you send.

"My uncle forwarded a WhatsApp message saying the government can now read all our WhatsApp chats. Is that true?" A friend asked me this over dinner a few weeks ago, and honestly, I wasn't surprised. Encryption is one of those topics where almost everyone has heard the word, most people have a vague sense it means "secure," and nearly nobody understands what's actually happening. So let me try to explain this in a way that doesn't require a computer science degree, because it matters more than you probably realize.
What Encryption Isn't
Let's start with what encryption isn't. It's not a magic shield. It's not a setting you toggle on. And it's not something that makes you invisible online. When people hear "encrypted," they sometimes imagine their messages turning into an impenetrable forcefield. The reality is more specific, more interesting, and more limited than that. Encryption is a math problem. That's it. A really clever math problem that makes your message unreadable to anyone who doesn't have the right key to decode it.
Postcards, Envelopes, and Lockboxes
The postcard versus the sealed envelope. Here's probably the simplest way to think about it. When you send a regular, unencrypted message -- say, a standard SMS text or an email through most providers -- it's like mailing a postcard. The postal worker can read it. The sorting facility can read it. Anyone who handles it along the way can glance at what you've written. The message gets where it's going, sure, but it's exposed the entire journey. Now, "encryption in transit" is like putting that postcard in a sealed envelope. The postal workers can't read it while they're carrying it. But here's the catch: the post office (in this analogy, that's the company running the service) opens your envelope when it arrives at their sorting center, reads it, puts it in a new envelope, and sends it onward. They've seen your message. They might store a copy. They can hand it to the police if asked. That's how regular email, Instagram DMs, and Telegram's default chats work -- encrypted during travel, but the company can read them on their servers.
End-to-end encryption is different. With E2EE, imagine you put your letter in a lockbox, and only you and your friend have the key. You don't give a copy to the postal service. They carry the locked box from point A to point B, but they can't open it. If someone breaks into the post office, they find a bunch of locked boxes they can't crack. If the government shows up with a warrant, the post office says "here's the box, but we don't have the key." Only your phone and your friend's phone can decrypt the message. WhatsApp, Signal, and a handful of other services work this way.
How the Keys Actually Work (Without the Math)
How the keys actually work (without the math). This is the part that trips people up, so I'll keep it simple. When you install WhatsApp or Signal, your phone generates two keys: a public key and a private key. They're linked by math but you can't figure out one from the other. Think of the public key as a padlock you can give to anyone. Think of the private key as the only key that opens that padlock. Your public key gets uploaded to WhatsApp's servers so other people can find it. Your private key never leaves your phone. When your friend wants to send you a message, their phone grabs your public key (your padlock), uses it to lock the message, and sends it. Only your private key can unlock it. WhatsApp's servers see a locked box passing through. They don't have your private key. They can't open it. That's the "end-to-end" part -- the encryption starts at one end (your friend's phone) and only gets decrypted at the other end (your phone). Nobody in the middle can read it, not WhatsApp, not your internet provider, not anyone tapping the network.
WhatsApp, Signal, and the Telegram Confusion
WhatsApp's encryption, specifically. WhatsApp adopted the Signal Protocol (built by Open Whisper Systems, the same people behind the Signal app) back in 2016. It applies E2EE to all personal messages, voice calls, video calls, photos, videos, documents, and status updates by default. You don't have to turn it on. It's just there. Group chats are also end-to-end encrypted, though the implementation is slightly different for groups. When you see that little lock icon and the message "Messages and calls are end-to-end encrypted" at the top of a chat, that's what it means. The roughly 500 million WhatsApp users in India are, whether they know it or not, using military-grade encryption every time they send a "good morning" image or a voice note to their family group.
Signal takes it further. Signal is widely considered the gold standard for encrypted messaging, and for good reason. It's built by a nonprofit, it's fully open-source (meaning anyone can inspect the code), and it collects almost no metadata. When the FBI subpoenaed Signal's records in 2021, the company could hand over only two pieces of information per user: the date they created their account and the date they last connected. That's it. No message content, no contact lists, no group memberships, no profile data. Signal proves you can run a messaging service without hoarding user information. It's not as popular in India as WhatsApp -- maybe 15-20 million users compared to WhatsApp's 500 million -- but among journalists, activists, lawyers, and security-conscious professionals, it's the go-to.
The Telegram confusion. This one needs clearing up because a lot of people in India think Telegram is encrypted. It is, partially. Regular Telegram chats -- the ones you use 99% of the time, including group chats and channels -- use encryption in transit but are stored on Telegram's servers in a readable format. Telegram can access them. Only "Secret Chats," which you have to manually initiate, use end-to-end encryption. Most people don't use Secret Chats because they're buried in the settings and they don't support group conversations. So if you're on Telegram assuming your messages are private in the same way WhatsApp messages are, they're not. Telegram's founder Pavel Durov has defended this design choice by saying server-side access allows features like cloud sync and search across devices. That's true, but the privacy trade-off is real and most users aren't aware they're making it.
Why Governments Want to Break Encryption
Why governments want to break it. Here's where it gets political, and India is right at the center of this debate. The Indian government's IT Rules of 2021 include a provision requiring "significant social media intermediaries" to enable "identification of the first originator" of a message when ordered by a court or authorized government agency. On its face, this sounds reasonable -- if a piece of misinformation goes viral and causes a riot, shouldn't authorities be able to trace who started it? But here's the technical problem: in a true E2EE system, the platform doesn't know who sent what to whom. The content is invisible to them. To trace the originator of a specific message, WhatsApp would have to either break encryption (so it can read messages and match them) or add a hidden tracking tag to every message (which creates a backdoor that could be exploited). WhatsApp challenged the traceability requirement in the Delhi High Court. The case was still winding through the courts as of early 2026, and the outcome will likely shape encryption policy not just in India but globally, given India's scale.
The backdoor problem, explained. Governments often say they don't want to "break" encryption -- they just want a "backdoor" for law enforcement, a special key that only authorized agencies can use. Security researchers have a near-unanimous response to this: there's no such thing as a backdoor that only the good guys can use. If you build a door, anyone with enough skill and motivation will eventually find it. A government backdoor in WhatsApp wouldn't just be available to Indian law enforcement. It would be a target for every hacker, every hostile intelligence agency, and every criminal organization on the planet. The moment you weaken encryption for one purpose, you weaken it for all purposes. This isn't a theoretical concern -- the U.S. learned this the hard way in 2024 when a "lawful access" backdoor in a major telecom system was reportedly compromised by a foreign intelligence service.
What E2EE Doesn't Protect
What E2EE doesn't protect. And this is where people get tripped up. End-to-end encryption protects the content of your messages while they're in transit and on the server. It does not protect against a lot of other things, and knowing those limits is just as important as understanding the protection itself.
First: metadata. Even with E2EE, WhatsApp knows who you messaged, when you messaged them, how often, for how long, and from what IP address (which reveals your approximate location). It doesn't know what you said, but the pattern of communication itself tells a story. If someone messages a particular phone number fifty times in a week, at odd hours, from a location near a protest site -- that metadata is informative even without the message content. Intelligence agencies have openly acknowledged that metadata can be more useful than content in many investigations. "We kill people based on metadata," a former NSA director once said. He wasn't joking. WhatsApp shares metadata with its parent company Meta, and Meta's privacy policy allows that metadata to be used for advertising targeting and business analytics. So even though Meta can't read your messages, it knows who your close contacts are, what time zones you're active in, how responsive you are, and how frequently you communicate with specific people. That's a pretty detailed social graph built entirely without reading a single word you typed.
Second: your device. E2EE protects messages in transit. Once the message arrives on your phone and gets decrypted, it sits there in readable form. Anyone who picks up your unlocked phone can read it. Malware on your device can read it. A screen-recording app can capture it. Spyware like Pegasus doesn't bother trying to intercept messages in transit -- it compromises the device itself and reads the decrypted messages directly. Encryption is only as strong as the device it lives on.
Third: backups. If you back up your WhatsApp chats to Google Drive or iCloud without enabling encrypted backups, those messages are stored in plaintext on cloud servers. Google and Apple can access them, and they can be compelled to hand them over with a legal order. WhatsApp introduced encrypted backups in 2021, but it's not turned on by default. You have to go to Settings > Chats > Chat Backup > End-to-end Encrypted Backup and enable it manually. Most people haven't.
Fourth: the other person. Your messages are encrypted between you and the recipient. But the recipient can screenshot them, forward them, copy-paste them, or read them aloud to someone in the room. Encryption protects messages from intermediaries. It can't protect you from the person you're talking to.
Common Misconceptions About Encryption
Common misconceptions I keep hearing. "Encryption means I'm anonymous." No. It means your message content is private, but your identity is still attached to your phone number and account. "If I use WhatsApp, the government can't see anything." They can't read message content (assuming no device compromise), but they can access metadata, and they can compel WhatsApp to share it. "Telegram is more private than WhatsApp." For default chats, it's actually less private in a meaningful way, since Telegram can read your regular messages and WhatsApp can't. "Encryption protects me from hackers." Only from a specific type of interception. If a hacker gets into your phone through malware or phishing, encryption doesn't help. The message is already decrypted on your screen.
The Indian Government's Position on Encryption
The Indian government's stated position has been consistent: they support encryption but oppose "unregulated" encryption that prevents law enforcement from doing its job. In practice, this translates to pressure on platforms to build mechanisms that enable government access under certain conditions. Whether those conditions include adequate safeguards, independent oversight, and judicial authorization -- that's the debate. Right now, the surveillance powers under Section 69 of the IT Act don't require a judge's approval. They're authorized by an executive officer. Many privacy advocates argue that any system for breaking encryption should, at minimum, require a warrant from a sitting judge, with regular audits and sunset clauses. That framework doesn't exist yet in Indian law.
The global context matters here. India isn't alone in pushing back against strong encryption. The UK's Online Safety Act includes provisions that could compel platforms to scan encrypted messages. Australia passed the Assistance and Access Act in 2018 with similar intent. The EU's proposed "Chat Control" regulation would mandate client-side scanning of messages, even encrypted ones, for child exploitation material. In each case, the justification is combating serious crime. In each case, cryptographers and security researchers have warned that the technical mechanisms required would undermine encryption for everyone, not just criminals. India's policymakers watch these international developments closely, and any precedent set elsewhere -- particularly if a major democracy successfully mandates encryption backdoors without catastrophic fallout -- would likely accelerate India's own push.
Alternatives to Breaking Encryption and What You Should Do
There's also the question of alternatives to breaking encryption. Law enforcement doesn't necessarily need to read message content to investigate crimes. Metadata analysis, device forensics (with a warrant), informant intelligence, traditional surveillance, financial records, and witness testimony have solved cases for decades. The argument that encryption creates "going dark" zones where criminals operate with impunity is, many security experts would say, overstated. Criminals who use encrypted messaging can still be identified through metadata patterns, device seizures, undercover operations, and the simple fact that most people make operational security mistakes. Breaking encryption for everyone to catch a relative few is a bit like removing all doors from all houses because some houses might contain criminals. The proportionality test from Puttaswamy seems clearly relevant here, yet it hasn't been applied in any concrete way to the encryption debate.
What should you do with all this? Use WhatsApp if it works for your life -- it's encrypted by default and that's genuinely better than nothing. Turn on encrypted backups if you haven't (Settings > Chats > Chat Backup > End-to-end Encrypted Backup). If you have conversations that are genuinely sensitive -- journalistic sources, legal consultations, medical discussions, political organizing -- consider using Signal for those. Keep your phone updated and be skeptical of links, even from people you know. And remember that encryption protects the pipe, not the endpoints. Your phone's lock screen is part of your encryption strategy, whether you think of it that way or not.
I'll end with something a security researcher told me last year at a conference in Bangalore. He said the best analogy for encryption isn't a lock or a safe or a secret code. It's a conversation in a soundproof room. When you and I step into that room and close the door, nobody outside can hear what we say. That's what encryption does -- it builds the room. But if someone's already inside the room with us (malware), or if one of us walks out and repeats the conversation (screenshots), or if someone checks the door logs to see who entered the room and when (metadata), the soundproofing doesn't help. The room is still worth having. It keeps out the vast majority of eavesdroppers. Just don't mistake the room for a fortress.
Written by
Rajesh KumarFounder & Chief Editor
Rajesh Kumar is a cybersecurity expert with over 12 years of experience in digital privacy and data protection. He has worked with CERT-In and various Indian enterprises to strengthen their data security practices. He founded PrivacyTechIndia to make privacy awareness accessible to every Indian.
Related Posts
Encrypted DNS: How to Protect Your Browsing from ISP Snooping
Picture this: you open your laptop, visit a medical website, then a job portal, then your bank. Your ISP just logged all three. Encrypted DNS stops that — and setting it up takes about five minutes.
Open Source Privacy Tools Every Indian Should Use
You don't need to spend money to take back your privacy. Every tool on this list is free, open source, and works in India. Most of them take less than ten minutes to set up.
How to Use Tor Browser Safely in India
Tor isn't just for hackers or whistleblowers. It's a legitimate privacy tool, it's legal in India, and most people use it wrong. Here's what happened when I started using it properly, and what you should know before you try.


