Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This works if physical contact is available and parties are trusted (even the weakest literal reading of fourth amendment says "right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures," -- exchanging a key token counts as such).

Yet what of basic online communications where key-exchange is necessary and where we have very little say about the protocols involved?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: