Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah sure, you're saying that the model for full disk encryption would be more relevant here. But at the same time, there is a third-party server in the middle of the protocol, and so I'm not sure if that model would be more relevant.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: