WHAT RCS REPLACES
SMS was designed in 1984 as a 160-character side-channel of voice cellular networks. It has no encryption, no read receipts, no group chat, and no media beyond what MMS bolts on. Every SMS in transit is readable by the carrier — and by anyone with lawful or unlawful access to carrier infrastructure.
WHAT E2EE ACTUALLY DOES
End-to-end encryption means the message is encrypted on the sender's device and only decrypted on the recipient's device. The server in between sees ciphertext — it can store and forward but cannot read. Not even the company running the service can access the content.
THE BLUE-BUBBLE LOCK-IN
For a decade Apple ran iMessage as an exclusively Apple-to-Apple encrypted channel. Texts to Android phones silently downgraded to unencrypted SMS, marked with green bubbles. The asymmetry became a Gen-Z social signal and a regulatory target — the EU's Digital Markets Act explicitly threatened to force interoperability.
THE PROTOCOL UNDERNEATH
The encryption standard is Messaging Layer Security (MLS), ratified by the IETF in 2023. Unlike Signal's older Double Ratchet, MLS is designed for efficient group chats — it scales key updates logarithmically rather than linearly with group size. It is the first IETF-standardized E2EE protocol.
WHAT GOVERNMENTS LOSE
Lawful intercept of SMS is a checkbox at every major carrier — a court order produces plaintext within hours. With E2EE, the carrier can only hand over metadata: who messaged whom, when, and how big the payload was. The content itself sits beyond subpoena. The UK, Australia, and India have all proposed legislation that would compel platforms to break this property.
THE METADATA STILL LEAKS
E2EE protects content, not the social graph. Carriers and Apple still see your phone number, your contacts' numbers, message timing, and group membership. Intelligence agencies historically treat this metadata as more analytically valuable than content — General Michael Hayden's line was 'we kill people based on metadata.'
WHO STILL CAN'T USE IT
RCS runs over IP, not the cellular voice channel — it requires an active data connection and carrier RCS support. In countries where carriers have refused to enable RCS (China's three state carriers route everything through WeChat instead), or where cheap phones default to SMS, the new encryption is invisible.