Hacker News new | past | comments | ask | show | jobs | submit login

That was the strategy for that situation. They can use national security letters and gag orders to force multinationals to silently turn over root certificates, they can intercept hardware you buy in the mail, they can MITM your connection with the full cooperation of your ISP. Anyone who thinks they’re going to defend themselves against a targeted attack by the most sophisticated and well funded state-level attacker in the world is dreaming.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: