End to end encryption technology: What about the Man in the middle?