You serve it on the person who operates the communications technology they are using, or a person who will use the warrant to lawfully break into the premises where they’ll be speaking and install a bug.
In theory, end-to-end encryption should not be vulnerable to this, as long as you verify your friend’s key in person and trust the software not to let it change without warning you. Nothing distributed through an app store can be this trustworthy.
In theory, end-to-end encryption should not be vulnerable to this, as long as you verify your friend’s key in person and trust the software not to let it change without warning you. Nothing distributed through an app store can be this trustworthy.