Hacker News new | past | comments | ask | show | jobs | submit login

It seems to me the way to get around this (for the nervous government) is to attack the iphone itself and capture keystrokes, nay?



> If authorities wanted to intercept the communications of a person using Silent Circle, it is likely they’d have to resort to deploying Trojan-style tools—infecting targeted devices with spyware to covertly record communications before they become encrypted.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: