That’s precisely what E2EE is supposed to prevent. If the phone company gets hacked, attackers can see all the traffic going through all of their towers, so if everything is encrypted before getting to the towers, they can’t see the contents. IIRC, metadata like phone numbers can be read though, so they can see who you’re talking to, but they can’t see what you’re saying.
The phone manufacturer, however, can see everything before it’s encrypted and after it’s decrypted.
At this point you have to assume that if you are not using your own install of custom Android ROM, your end point is not secure beyond keeping stupid criminals out
That’s precisely what E2EE is supposed to prevent. If the phone company gets hacked, attackers can see all the traffic going through all of their towers, so if everything is encrypted before getting to the towers, they can’t see the contents. IIRC, metadata like phone numbers can be read though, so they can see who you’re talking to, but they can’t see what you’re saying.
The phone manufacturer, however, can see everything before it’s encrypted and after it’s decrypted.
At this point you have to assume that if you are not using your own install of custom Android ROM, your end point is not secure beyond keeping stupid criminals out