Hacker News new | past | comments | ask | show | jobs | submit login

Seems to me that the inherent problem here was that you could get the sender to send messages of your choosing, which is always going to be a vulnerability. Consider that this entire line of discussion is redundant if (a) the encryption key is public (as stated above) or (b) you know what the plaintext looks like for some encrypted examples.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: