Hacker News new | past | comments | ask | show | jobs | submit login

Wouldn't that require you to retain all compromised keys, and daisy chain the encryption operations?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: