Hacker News new | past | comments | ask | show | jobs | submit login

The choice of encryption algorithm only lets us point out which systems are broken, not which ones are secure. A secure system could never use ROT13, but a broken system could definitely use AES256.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: