Welcome to our new help center!

End-to-end encryption

Updated May 8, 2026

What is end-to-end encryption?
End-to-end encryption (E2E) means that your data is end-to-end encrypted from sender to recipient. Only authorized participants can decrypt and read the transmitted information. Third parties, including edudip, have no access to the content (audio, video and screen sharing data) of your webinars. This ensures that your sensitive information remains secure and private at all times.

Why is end-to-end encryption important?
In a digital world where data leaks and cyber attacks are becoming more common, protecting your information is essential. With E2E encryption, you protect yourself against unauthorized access and ensure that confidential information, trade secrets or personal data of your participants do not fall into the wrong hands.

This is how E2E encryption works at edudip

With end-to-end encryption, you have Starting with the premium subscription The option to encrypt selected webinar data is available.

When hosting webinars and online training courses, every session is automatically protected by our end-to-end encryption technology. The encryption takes place directly on your device before the data is sent over the Internet and is only decrypted again on the recipient's device. This method guarantees that no one but you and the authorized participants has access to the data.

This is how it all works in detail: Each user in a room creates a public/private key pair and sends the public key to everyone else in the room. Anyone who wants to release audio or video content creates a synchronous key for their own media data and encrypts it for every user in the room with their public key. The encrypted information is then sent to the respective participants. When this message is received, the recipient uses their own private key to decrypt and add the synchronous key and thus the media files. When a user leaves the room, all keys are automatically rotated.