The end-to-end encryption paradigm does not directly address risks at the communications endpoints themselves. Each user’s computer can still be hacked to steal his or her cryptographic key (to create a MITM attack) or simply read the recipients’ decrypted messages both in real time and from log files.
When you call a dead phone does it ring?
Answer: A: With a dead battery it should not ring but it should go to voicemail directly.