Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The keys could be generate on the devices and never leave them.

Of course, if the software is not open source, that's hard to police. But abstracting away the key generation from the user doesn't mean that the services can read your messages.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: