Hacker News new | past | comments | ask | show | jobs | submit login

Much like today's TCP/IP world, the encryption was layered on top of the phone call. The military used codebooks, code words, and authorization codes.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: