Hacker News new | past | comments | ask | show | jobs | submit login

If an encryption back door exists, one can assume that it will be exploited. The same applies to private key encryption where a company holds private keys instead of individuals holding their own.



Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: