Hacker News new | past | comments | ask | show | jobs | submit login

They're encrypted with keys that your computer knows, or your computer wouldn't be able to read it. It's not too difficult to find that key and decrypt the information. Once you do that, it's just a matter of figuring out the way the info is sent. This would be pretty easy once the key is taken out.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: