Hacker News new | past | comments | ask | show | jobs | submit login

Many efforts have been started to have a middle ground, for example key escrow. However, key escrow might not be that different from allowing almost anyone to pwn your communications and data... that was a huge argument in the mid-1990s.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: