The advent of instantaneous communication via the Internet in the 80s and 90s has revolutionized the way we communicate. Suddenly, we could connect with people all over the world by sending emails and instant messages at a fraction of the previous cost. This advancement gave rise to countless social and political achievements, such as remote work and the climate movement, that might have been impossible without it. However, as we scaled from face-to-face to worldwide communication, opportunities for lawful as well as unlawful actors to monitor this communication scaled as well. In 2013, Edward Snowden’s revelations of widespread Internet surveillance made the public, as well as privacy and security experts, acutely aware of the dangers of pervasive monitoring. In response, many service providers have deployed transport encryption, such as TLS, to prevent passive monitoring on the Internet and local networks. Despite these efforts, digital communication remains at risk from lawful inter- ception and attacks on service providers. The solution is end-to-end encryption, which protects messages from the sender all the way to the receiver. In this thesis, we investigate both transport and end-to-end encryption protocols to uncover corner cases in which they fail to deliver the promised security. The starting point of our analysis on transport encryption is a survey on the security of TLS and, specifically, the STARTTLS protocol. Through systematization and extension of knowledge on STARTTLS vulnerabilities, we develop practical attacks breaking the confidentiality, integrity, and authentication of STARTTLS connections. Smartwatches explicitly marketed for children also use transport encryption to protect data in transit between the app or smartwatch and the manufacturers’ servers. We analyze this and the general security of these watches. Our analysis shows that a Meddler-in-the-Middle can break the authentication and confidentiality of TLS in one smartwatch ecosystem and another manufacturer’s custom encryption protocol. Additionally, a web attacker can compromise the API authorization and gain unauthenticated access to children’s sensitive data in the operators’ backends. The issues we found with transport encryption and general data security underline the need for end-to-end encryption. Our end-to-end encryption research focuses on the security of email communication and common document formats. This research reveals that the email end-to-end encryption protocols S/MIME and OpenPGP insufficiently protect against Oracle Attacks—an attack class researchers formerly considered impractical against these protocols. With new techniques based on format oracles, an attacker can break end-to-end encrypted emails through traffic monitoring—independent of whether email client and server use transport encryption.