Hacker News new | past | comments | ask | show | jobs | submit login

Does the specific feature mentioned in the article have to do with any of this? I fail to see how this proxy can be abused by Apple as you seem to be implying because they won't be able to see the contents of the queries, which is secured by TLS.



The TLS will necessarily be terminated by Apple, so they could definitely see the hashes if they cared to.


I was under the impression that Apple would just tunnel the encrypted connection.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: