Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's how most encryption protocols work now, by exchanging symmetric encryption keys at the start. There are protocols to do this, PGPfone was written in the 90s.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: