Data hacking
In all modern areas of IT-Technology, hacking is an immense problem. After all, security is only as strong as its weakest element. Cybercriminals prefer to focus their attacks on data because it is most vulnerable once you store it on a server. However, End-to-end encryption stores your data content encrypted, which means that hackers cannot access it. Even if the criminals manage to get hold of the data, the cybercriminals can’t do anything with it. Therefore, even in such a worst-case scenario, your data content is safe.
VPN or E2EE: How does end-to-end encryption work?
Technologies such as VPN use modern encryption techniques to provide you with the necessary IT security. While VPN uses other encryption mechanisms, TeamViewer Meeting relies on end-to-end encryption.
The basis for E2E-encryption are cryptographic keys that you store on your end device. A public key can be shared with others, while the private key remains on your endpoint. Following the sharing, your interlocutor can use the public key to encrypt the message and send it to you.
In online communication, on the other hand, the exchange usually takes place through an intermediary. This is usually a server owned by an ISP. Here, too, the public key infrastructure ensures that your messages cannot be intercepted. If you try to reset the end-to-end encrypted data, the messages are deleted, and you can no longer access them. This makes the security concept particularly reliable.
TeamViewer’s end-to-end and data security
TeamViewer attaches great importance to the security of your data and messages. That’s why TeamViewer Meeting also uses the end-to-end encryption mechanism. However, this is not the only security measure we take: TeamViewer is secured by end-to-end 256-bit AES encryption, 4096-bit RSA key encryption, two-factor authentication, and other industry-grade security features. We are certified according to SOC2, HIPAA/HITECH, ISO/IEC 27001, and ISO 9001:2015, and comply with GDPR.