http://ssd.iykpqm7jiradoeezzkhj7c4b33g4hbgfwelht2evxxeicbpjy44c7ead.onion/zh-hans/module/communiquer-avec-autrui
                                
                                
                                                                            In the middle, your messaging service provider—or the website you are browsing, or the app you are using—can see unencrypted copies of your messages, but it is protected from others spying on the network. Under the hood, end-to-end encryption works like this: When two people want to communicate via end-to-end encryption (for example, Akiko and Boris) they must each generate pieces of data , called keys.