Re: End to end encryption is not enough
The crucial part here is "End to end".
If you have the appropriate access at one or other end you will always be able to read the content. If you could not then the entire thing is pointless.
The wider issues surround the (mostly US) security services requesting access.
All providers have slight variations on the same wording.
https://www.microsoft.com/en-us/corporate-responsibility/reports/government-requests/customer-data
Microsoft reviews every legal demand to ensure it is valid and complies with applicable laws. A subpoena or its local equivalent is required to request non-content data, and a warrant or its local equivalent is required for content data.
Microsoft discloses customer data only when legally compelled to do so.
Microsoft does not provide any government with direct or unfettered access to customer data.
Microsoft does not provide any government with our encryption keys or the ability to break our encryption.
https://aws.amazon.com/compliance/data-privacy-faq/
We will not disclose customer content (see How does AWS classify customer information? below) unless we're required to do so to comply with the law or a valid and binding order of a government body. If a governmental body sends AWS a demand for your customer content, we will attempt to redirect the governmental body to request that data directly from you. If compelled to disclose your customer content to a government body, we will give you reasonable notice of the demand to allow you to seek a protective order or other appropriate remedy unless AWS is legally prohibited from doing so.
https://www.oracle.com/cloud/sovereign-cloud/data-sovereignty/
Read this if you have time and want to increase you blood pressure.
I lost the will to live trying to find one for Google......