If you do not control the keys and the software that controls the keys, then you are not using end to end encryption.
If you do not control the keys and the software that controls the keys, then you are not using end to end encryption.