Thursday, December 4, 2025

“End-to-End Encrypted”

Simon Fondrie-Teitler (Hacker News, Slashdot):

In October Kohler launched Dekota, a $600 (plus monthly subscription) device that attaches to the rim of your toilet and collects images and data from inside, promising to track and provide insights on gut health, hydration, and more. To allay the obvious privacy concerns, the company emphasizes the sensors are only pointed down, into the bowl, and assures potential buyers that the data collected by the device and app are protected with “end-to-end encryption”.

Kohler Health’s homepage, the page for the Kohler Health App, and a support page all use the term “end-to-end encryption” to describe the protection the app provides for data. Many media outlets included the claim in their articles covering the launch of the product.

However, responses from the company make it clear that—contrary to common understanding of the term—Kohler is able to access data collected by the device and associated application. Additionally, the company states that the data collected by the device and app may be used to train AI models.

E2EE has become a marketing term, and I no longer believe it unless the company also provides a technical description of what they mean by it. For over a decade—before iCloud Advanced Data Protection—Apple marketed iMessage as being E2EE. This was technically true, because the protocol was E2EE, but in practice the system was not E2EE because Apple had access to the key (in the iCloud backup). In Kohler’s case, there seems to be nothing that’s actually E2EE. It’s “simply HTTPS encryption,” combined with “technical safeguards and governance controls.”

Previously:

3 Comments RSS · Twitter · Mastodon


I think you kinda hit it, which is "end to end" is ambiguous. I've always considered it akin to "encrypted in transit" (ie: HTTPS), in that on the origin device and possibly (usually) on the server, the information is not encrypted, as that is "encrypted 'at rest'". Folks who are serious about encryption always make that distinction, and anyone who doesn't should be suspect.


@CM Wikipedia says:

End-to-end encryption (E2EE) is a method of implementing a secure communication system where only the sender and intended recipient can read the messages. No one else, including the system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to read or send messages.

That seems pretty clear to me, but I guess the rub is what counts as part of the “system.”


It's not ambiguous. Encrypted in transit is not e2ee.

Some people just lie about how their systems work.

Leave a Comment