The phone companies store content for FBI backdoors in plaintext on their servers. Compromising Apple/Google servers would require attacker to also know encryption backdoor. RCS (Diffie Helman key exchange) can fake end to end encryption through man in the middle (ISP/Google/Apple). Database access to the party would have everything needed for plaintext retrieval, because fake keys would need to be stored along with users.
The phone companies store content for FBI backdoors in plaintext on their servers. Compromising Apple/Google servers would require attacker to also know encryption backdoor. RCS (Diffie Helman key exchange) can fake end to end encryption through man in the middle (ISP/Google/Apple). Database access to the party would have everything needed for plaintext retrieval, because fake keys would need to be stored along with users.