Hacker News new | past | comments | ask | show | jobs | submit login

Every accessor needs the keys - all relevant field commanders, etc. They also need security clearances. The keys need to be stored and managed securely. They should also be updated regularly, which means that all commanders need new keys at some point. I presume the keys for each UAV would be different.

In WW2 it was only a few top commanders who worked with Ultra (afaik), and it wasn't anywhere as regular as broadcast video. I guess the main difference here is the number of users is that much greater and in Schneier's opinion the value of the information is that much lesser.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: