Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Encryption without E2EE is completely worthless for the threat model discussed here.


That’s right. It’s either E2EE, or it’s not encrypted IMHO.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: