Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I agree that some claims about e2e are misleading. That said, you could interpret "mathematically impossible" very charitably as risk assessment math. It's mathematically impossible to improve investigability while also improving resistance to spying by adversaries. Their relationship must be inverse. I agree that most people would interpret "math" as cryptography, and that it's better to make a clearer distinction between cryptography and risk assessment maths.

However this goes both ways. People demanding a solution think that you could make something investigable while keeping it completely airtight to adversaries or abuse. There is no escaping the fact that this is mathematically impossible in terms of how risk works. You can compromise security in favor of investigability, or you can improve security at the cost of investigability. And it's also important for the lawmakers to understand that each compromise is not gradual. It's drastic. If you went from 1 party having a key, to 2 parties, you've probably doubled vulnerability surface. If it's 3 parties, and one of those parties is an organization with lots of employees, you've probably exponentially increased vulnerability surface by orders of magnitude. This math does apply here.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: