Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The important aspect of this and the Apple scenario is that the encryption requires a benevolent third party. Encryption that relies on Eve...well, she has three faces.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: