Are the transmission paths via radio, for example, also encrypted? - LSM 3.5 SP3 Basic
No. Thanks to consistent end-to-end encryption, our secure communication is independent of the transmission method. Intercepted data cannot be read without the appropriate secret key. End-to-end encryption allows the use of system-specific transmission paths without loss of performance.