While I largely agree with you, technically it is still E2EE even if the encryption is very poor (e.g. hey look I shifted every character by one along the ASCII table).
Poor encryption could then be broken by a party in the middle.
All of that said this is a bit irrelevant, if the encryption is so poor the provider can break it at will, so can bad actors. We don’t use broken (bad) encryption for a reason.
While I largely agree with you, technically it is still E2EE even if the encryption is very poor (e.g. hey look I shifted every character by one along the ASCII table).
Poor encryption could then be broken by a party in the middle.
All of that said this is a bit irrelevant, if the encryption is so poor the provider can break it at will, so can bad actors. We don’t use broken (bad) encryption for a reason.