Hacker Newsnew | past | comments | ask | show | jobs | submit | dtpro20's commentslogin

Well its more like search and replace, where you cross your fingers that it only replaces the words you are trying replace without impacting the rest of the text in the document.


It's almost exactly the premise of the movie "I am Legend," But it uses CRISPR instead of a Virus as the delivery mechanism.


I don't have time for the overly polite fluff talk to the expense of practical and real communication. It is hard to be caring and direct. Being triggered by anything can be ptsd, and/or a self defense mechanism for incompetence, so it's important to work out what is going on in these cases. But yes, it is absolutely possible to be caring and gracious while still being direct when you exclude the people who will over react as a self defense mechanism as a result of valid or invalid reasons.


To call it lying is just arguing about the meanings of words. This is literally what lawyers are paid to do. The data payload can be called end to end encrypted. You can easily say to the user that "your emails are encrypted from end to end, they are encrypted before it leaves your computer and decrypted on the receivers computer" without talking about how your key server works.

Systems that incorporate a method to allow unlocking using multiple keys don't usually advertise the fact that this is happening. People may even be legally obligated to not tell you.


Well Wikipedia says this about E2E:

“End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including the system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to read or send messages.”

So if you send another set of keys to someone else, it’s obviously not E2E.


This is a high level description of intent (by a third party), not a legal promise.

This is not enforceable and promises that are not enforceable are usually seen by BigCos of today as optional. My 2c.


Well I wasn’t saying I would sue them, I was arguing this:

> It is possible to set up end to end encryption where two different keys unlock your data. Your key, and a government key. I assume google does this.

Which by definition is wrong (unless the government is a party in the communication you want to E2E-Encrypt).


I agree completely that it is wrong in spirit. But wikipedia's text is a definition, not the only existing one. And for practical use even the most obvious definitions have legal caveats.

For example, asking for 10 gallons of soda at a restaurant advertising unlimited refills will not fly, even though virtually everyone will agree on the definition of the term "unlimited". My 2c.


I believe the point being made here is that some governments legally mandate that they are a party in communication.


> To call it lying is just arguing about the meanings of words.

Or, as us lowly laypeople call it, lying.


TIL man in the middle = e2e encryption.


E2E encryption is not the same as MITM. You’re not adding anything useful to the conversation.

E2E encryption is not vulnerable to MITM. E2E encryption is vulnerable only to how many keys there are and who has access to them.


If someone except the communicating parties has access to the keys, it’s not E2E encrypted anymore though. At least according to this definition:

https://en.wikipedia.org/wiki/End-to-end_encryption


SO if google still has access in an E2E system, but you didnt know, is it still E2E?

What if google told you they also have a key? Does that change the above answer to the question?


These are amazingly beautiful. I'd be tempted to buy one if it didn't have the brand logo etched into the wood.


This! Posting so that they might read it and reconsider that choice :)


Yeah, that seems like a bad decision to me too.


I don't understand how it is possible that they are allowed to collect and store video security footage, but they are not allowed to analyze it for people banned from the store.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: