Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Would I be correct in concluding then that your suggested "end-to-end encrypted communication--and likely even peer-to-peer direct communication ... to the device in question" is simply not possible without individual case-based custom engineering?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: