Tech Terms | Abbreviations A–Z


E2EE, End-to-End-Encryption, Electronic Mail, E-Mail, Email, Email Spam, eSIM, EULA

End-to-End Encryption

decrypt the conversation.

End-to-end encryption is intended to prevent data being read or secretly modified, other than by the true sender and recipient(s). The messages are encrypted by the sender but the third party does not have a means to decrypt them, and stores them encrypted. The recipients retrieve the encrypted data and decrypt it themselves.

Because no third parties can decipher the data being communicated or stored, for example, companies that provide end-to-end encryption are unable to hand over texts of their customers' messages to the authorities.

In 2022, the UK's Information Commissioner's Office, the government body responsible for enforcing online data standards, stated that opposition to E2EE was misinformed and the debate too unbalanced, with too little focus on benefits, since E2EE "helped keep children safe online" and law enforcement access to stored data on servers was "not the only way" to find abusers.

This article is based on the article End-to-end_encryption from the free encyclopedia Wikipedia and is licensed under Creative Commons CC-BY-SA 3.0 Unported (short version). A list of authors is available in Wikipedia.

Electronic Mail (Email or E-Mail or email or e-mail)

is a method of exchanging messages ("mail") between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging. Ray Tomlinson is credited as the inventor of email; in 1971, he developed the first system able to send mail between users on different hosts across the ARPANET, using the @ sign to link the user name with a destination server. By the mid-1970s, this was the form recognized as email.

Email operates across computer networks, primarily the Internet. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simultaneously; they need to connect, typically to a mail server or a webmail interface to send or receive messages or download it.

Originally an ASCII text-only communications medium, Internet email was extended by Multipurpose Internet Mail Extensions (MIME) to carry text in other character sets and multimedia content attachments. International email, with internationalized email addresses using UTF-8, is standardized but not widely adopted.

The history of modern Internet email services reaches back to the early ARPANET, with standards for encoding email messages published as early as 1973 (RFC 561). An email message sent in the early 1970s is similar to a basic email sent today.

This article is based on the article Email from the free encyclopedia Wikipedia and is licensed under Creative Commons CC-BY-SA 3.0 Unported (short version). A list of authors is available in Wikipedia.

Email Spam

also referred to as junk email, is unsolicited messages sent in bulk by email (spamming).

The name comes from Monty Python sketch in which Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.

Since the expense of the spam is borne mostly by the recipient, it is effectively postage due advertising. This makes it an excellent example of a negative externality.

The legal definition and status of spam varies from one jurisdiction to another, but nowhere have laws and lawsuits been particularly successful in stemming spam.

Most email spam messages are commercial in nature. Whether commercial or not, many are not only annoying, but also dangerous because they may contain links that lead to phishing web sites or sites that are hosting malware – or include malware as file attachments.

Spammers collect email addresses from chat rooms, websites, customer lists, newsgroups, and viruses that harvest users' address books. These collected email addresses are sometimes also sold to other spammers.

This article is based on the article Email_spam from the free encyclopedia Wikipedia and is licensed under Creative Commons CC-BY-SA 3.0 Unported (short version). A list of authors is available in Wikipedia.


(abbr.): embedded SIM. Space-saving soldered on the board. An eSIM can be loaded with several tariffs from various mobile service providers. The desired tariff can then be activated by smartphone software. All three German network operators (Telekom, Vodafone and Telefónica) support the new standard, which has quickly gained acceptance since the end of October 2018 thanks to Apple's first devices with eSIM (iPhone Xs, Xs Max and Xr). Google's Pixel 3 (XL) with eSIM had its market launch in mid-October 2018, but unfortunately without Dual SIM.


(abbr.:) Multiple Enabled Profiles: for devices running Android 13 or higher, Android supports multiple enabled profiles (MEPs) for eUICC (eSIM). This feature allows devices to have Dual SIM support using a single eSIM chip, which can have multiple SIM profiles and can connect to two different carriers at the same time. Device manufacturers must work with SoC vendors and eSIM chipset vendors to integrate this feature on their devices.


On devices running Android 12 and lower, AOSP provides limited support in allowing a single eSIM to support multiple profiles at the same time. Despite the significant space and cost savings that eSIM offers, this lack of Dual SIM support prevents device manufacturers from adopting eSIM-only devices. To provide Dual SIM support on an eSIM-only device, device manufacturers have to pack two eSIM elements into the device, which increases bill of material (BOM) costs and leads to poor user experiences for subscription management. The MEP feature available in AOSP from Android 13 addresses this issue.


An end-user license agreement is a legal contract entered into between a software developer or vendor and the user of the software, often where the software has been purchased by the user from an intermediary such as a retailer. A EULA specifies in detail the rights and restrictions which apply to the use of the software.

This article is based on the article EULA from the free encyclopedia Wikipedia and is licensed under Creative Commons CC-BY-SA 3.0 Unported (short version). A list of authors is available in Wikipedia.

Back to overview

Keyword list: ASCII, Android, Arpanet, Author, Books, Chat, Computer, Download, E, E-Mail, E2EE, Email Spam, End-to-end-Encryption, End-to-end encryption, Glossary, History, IT, Instant Messaging, Internet, Link, Links, Network, Online, Phishing, Pixel, Providers, SIM, Server, Service, Services, Smartphone, Software, Spam, Tariffs, User, eSIM, iPhone, vendors

Last edited: