Take back control with end-to-end encryption

The other day I was thinking about how I could possibly explain the differences between encryption-in-transit and end-to-end/client-side encryption and show the importance of the latter and the realistic weaknesses of the former. Cue Scarlett Johansson in the movie Lucy (2014).