End-to-end encryption is moving beyond consumer messaging applications and into the enterprise. The ratification of the IETF Messaging Layer Security (MLS) standard, combined with interoperability mandates under the EU Digital Markets Act and growing demand for secure business communications, is driving a fundamental shift in how organizations approach encrypted messaging.

MLS becomes official

The Internet Engineering Task Force formally ratified RFC 9420 (Messaging Layer Security) as a Proposed Standard on July 19, 2023, culminating years of development.

Development history

DateMilestone
2016Initial concept discussed at IETF 96 (Berlin)
2016-2023~5 years of development (similar to TLS 1.3)
July 19, 2023RFC 9420 published
2024-2026Enterprise adoption accelerates

Contributors

OrganizationRole
CiscoProtocol development
MetaProtocol development
GoogleProtocol development
MozillaProtocol development
WireProtocol development, reference implementation

MLS vs. Signal Protocol

AttributeSignal ProtocolMLS
Primary use1:1 and small groupsGroups up to 50,000
ScalabilityLimited for large groupsDesigned for scale
Member managementLess efficientEfficient add/remove
StandardizationDe facto standardIETF standard (RFC 9420)
Forward secrecyYesYes
Post-compromise securityYesYes

“MLS is not a replacement for the Signal Protocol. It builds on the same cryptographic foundations but solves the group messaging scalability problem that has been a barrier to enterprise adoption of end-to-end encryption.” — Raphael Robert, IETF MLS working group co-chair

Key MLS capabilities

FeatureBenefit
Efficient group managementAdd/remove members without full rekey
50,000+ participant supportEnterprise-scale groups
Asynchronous operationWorks with offline members
Multiple device supportConsistent across user devices
Reference implementationRust, permissive license

Enterprise adoption

Current implementations

PlatformStatus
Cisco WebexMLS implementation announced (January 2026)
WireContributing since early drafts
Matrix/ElementMigration to MLS underway
RingCentralEarly MLS integration
Google WorkspaceMLS under evaluation

RCS and mobile messaging

DateDevelopment
March 2025GSMA announces Universal Profile 3.0 with MLS support
March 2025Apple announces RCS support with MLS in Apple Messages
2024-2026Google Messages hybrid key exchange experiments

EU Digital Markets Act mandates

The EU DMA designated several large messaging platforms as “gatekeepers” in September 2023, requiring interoperability:

Timeline

DeadlineRequirement
March 2024Basic 1:1 text interoperability
2027Group messaging interoperability

Gatekeeper platforms

PlatformCompanyStatus
WhatsAppMetaInteroperability spec published (late 2025)
MessengerMetaInteroperability spec published (late 2025)
iMessageAppleSpecification expected mid-2026

Technical challenges

ChallengeConcern
Key management differencesPlatform-specific approaches
Trust model variationsDifferent verification methods
Metadata handlingPrivacy implications
Implementation qualitySecurity depends on correct implementation

“Interoperability is a policy goal, not a technical one. The question is whether it can be achieved without creating new attack surfaces.” — Matthew Green, Johns Hopkins University

Enterprise demand drivers

451 Research survey (Q4 2025):

Metric20232025
Enterprises evaluating/deployed E2EE29%48%

Driving factors

FactorDriver
State-sponsored surveillanceVolt Typhoon, APT campaigns targeting corporate networks
IP theft concernsBoard-level awareness of communication risks
Regulatory pressureFinancial, healthcare, legal sector requirements
Executive targetingPhone hacking incidents affecting corporate leaders

Platform responses

PlatformE2EE Status
SlackE2EE pilot for Enterprise Grid DMs
Microsoft TeamsE2EE for group calls (up to 50 participants)
Teams chatE2EE not available
WebexMLS implementation
WireE2EE-native

Encryption vs. compliance tension

E2EE in enterprise environments creates direct conflict with regulatory requirements:

Affected industries

SectorRequirement
Financial servicesSEC/FINRA message retention and supervisory review
HealthcareHIPAA audit trails for PHI communications
LegalAttorney-client privilege documentation
GovernmentRecords retention laws

The fundamental conflict

E2EE designCompliance requirement
Platform cannot access contentPlatform must archive content
Only endpoints can decryptRegulators must be able to review
No server-side copiesRetention policies mandate copies

Client-side archiving solutions

VendorApproach
SmarshClient-level capture before encryption
Global RelayEndpoint archiving integration
Theta LakeCompliance-ready archive storage

Security purist concern

“There is an inherent contradiction between the promise of end-to-end encryption and the requirement to retain and produce message content for regulators. Organizations need to be honest with their users about which promise they are actually keeping.” — Philip Zimmermann, PGP creator

Client-side archiving creates an additional plaintext copy, fundamentally undermining E2EE security guarantees.

Post-quantum cryptography research

DevelopmentStatus
PQC for MLSIETF Internet-Draft prepared
ResearchOngoing integration work
TimelineFuture MLS versions

Evaluation criteria

Security teams evaluating encrypted messaging platforms should consider:

Key management

QuestionConsideration
Who controls keys?Platform, organization, or individual users
Recovery mechanismsWhat happens if keys are lost
Key rotationHow frequently keys change

Compliance integration

QuestionConsideration
Archiving supportClient-side capture capability
Supervisory reviewWorkflow for compliance review
Regulatory alignmentSpecific industry requirements

Interoperability

QuestionConsideration
External communicationCan you securely message outside the platform
Protocol standardsMLS, Signal Protocol, proprietary
FederationCross-platform messaging capability

Metadata protection

QuestionConsideration
Content protectionMessage bodies encrypted
Metadata protectionSender, recipient, timing, group membership
Traffic analysisCan patterns reveal information

Signal Foundation perspective

Signal President Meredith Whittaker:

“Encryption is not a spectrum. Either the provider cannot read your messages, or they can. The details matter enormously.”

The Signal Foundation welcomes broader E2EE adoption while cautioning against implementations that compromise security for convenience.

Recommendations

For security teams

PriorityAction
InventoryCatalog current messaging platforms and security properties
RequirementsDefine encryption and compliance requirements
EvaluationAssess MLS-enabled platforms against requirements
TestingPilot E2EE messaging with security-conscious teams

For compliance teams

PriorityAction
Understand trade-offsE2EE vs. archiving implications
Evaluate solutionsClient-side archiving vendors
Document decisionsJustify approach to regulators
User communicationBe transparent about actual protections

For IT leadership

PriorityAction
Strategic planningE2EE as default expectation (3-5 year horizon)
Vendor engagementUnderstand platform E2EE roadmaps
Policy developmentGuidelines for encrypted communication use

Context

The convergence of MLS standardization, DMA interoperability mandates, and enterprise security requirements suggests that end-to-end encrypted messaging will become a default expectation for business communications within the next several years.

The technical foundations are now in place—MLS provides scalable group encryption, and major platforms are implementing or evaluating the standard. The remaining challenges are primarily organizational (balancing security with compliance) and regulatory (resolving the encryption-access tension).

For enterprises, the question is no longer whether to adopt E2EE, but how to implement it in a way that satisfies both security requirements and regulatory obligations. The answer may require accepting that perfect security and perfect compliance are mutually exclusive—and making deliberate choices about which compromises are acceptable.