Can you provide the source code that shows the implementation of the end-to-end encryption? Can you verify that you REALLY have Alice's public key and she has yours? Or are you trusting that the keys you're receiving from Apple's network belong to exactly who Apple says they do?
Lavabit offered in-network public key encryption for its users. Its implementation was faulty and investigators only needed an SSL key to get the information they wanted from suspects. They also ordered Lavabit to keep operating under the pretense that they were secure.
http://www.infoworld.com/article/2609583/encryption/how-secu...
Skype was advertised as "end-to-end" encrypted AND peer-to-peer networked for years, until it was slowly exposed as a lie. Skype's content is not end-to-end encrypted and the network is centralized.
http://arstechnica.com/security/2013/05/think-your-skype-mes...
White paper on the topic: http://blog.quarkslab.com/imessage-privacy.html Consumer grade article: http://arstechnica.com/security/2013/10/contrary-to-public-c...
Lavabit offered in-network public key encryption for its users. Its implementation was faulty and investigators only needed an SSL key to get the information they wanted from suspects. They also ordered Lavabit to keep operating under the pretense that they were secure. http://www.infoworld.com/article/2609583/encryption/how-secu...
Skype was advertised as "end-to-end" encrypted AND peer-to-peer networked for years, until it was slowly exposed as a lie. Skype's content is not end-to-end encrypted and the network is centralized. http://arstechnica.com/security/2013/05/think-your-skype-mes...