Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's a very specific reason I included B and C in my listed cases. I agree in many or most cases it could be said that it's unlikely certain encryption methods would be bypassed, but to me that only gives you a fairly good prospect of being secure, not an absolute certainty. That may or may not affect your original argument, I'm not sure.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: