Unless you’re given a decryption key and you have audited the source code to understand that you’re the only recipient of that decryption key. You should always assume that the vendor of such a service can decrypt your data if they wanted/have a reason to.
Unless you’re given a decryption key and you have audited the source code to understand that you’re the only recipient of that decryption key. You should always assume that the vendor of such a service can decrypt your data if they wanted/have a reason to.