Pushbullet has announced that it's starting to support end-to-end encryption for the main features of its apps. End-to-end encryption will work for notification mirroring, universal copy & paste, and SMS.
All of this information has been transmitted over https even before today, so it couldn't have been peeked at by malicious individuals. But the data was still readable by Pushbullet.
Not anymore. With end-to-end encryption, the data is encrypted before it leaves your device, and is only decrypted after it's received by another of your devices. So Pushbullet servers do nothing but forward encrypted data.
To set this up, you have to choose a password, which is used to derive a key that will encrypt your data, and manually enter this password on all of your devices. The functionality is now limited to the company's apps for Android and Windows, and its Chrome extension. That said, iOS support is promised to come soon alongside Mac, Opera, Safari, and Firefox.
"the data is encrypted before it leaves your device, and is only decrypted after it's received by another of your devices" How do I know this for sure? Is it possible to test? Sorry I just started using internet...
The issue isn't whether someone can intercept and decrypt, it's whether they can do that quickly enough for any information learned to still be useful. Taking any more than a few days to decrypt someone's SMS traffic usually isn't worth the effort -...
Find it really hard to believe that someone can't just decrypt it in the middle and read my message. I don't care though, I am no spy.