Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

On the contrary: a backup can be fully encrypted by a key under the user's control that isn't available to the storage provider.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: