All about me. My Bio.
“For example, if you send a message from Beeper to a friend on WhatsApp, the message is encrypted on your Beeper client, sent to the Beeper web service, which decrypts and re-encrypts the message with WhatsApp’s proprietary encryption protocol.”
So, not really end to end for most common use-cases.
I really don’t like the “but otherwise we’d need a warrant” approach.
Yes, of course you should need a warrant. That’s the bit that’s the safeguard and actually is the checks and balance against abuse. It’s not a problem to be optimized away.
There’s always a way: https://www.youtube.com/watch?v=VhYEOG9LOIk