Hacker News new | past | comments | ask | show | jobs | submit login

Also, I don't think "block of random looking bits" should be considered prima-facie evidence that it is encrypted data (by any particular key or even at all). But if there is strong evidence that key A was used to encrypt some bits, and if there is strong evidence that person B has access to key A, then compelling production of that key is not absurd if done correctly.



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: