Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

security researchers


So put them in a cohort and treat them differently than the rest of the users? Personalised key exchange? Possibilites are endless. If you don't trust the closed source operator here, then that end to end encryption should mean nothing for you.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: