Hacker News new | past | comments | ask | show | jobs | submit login

It's not implied; the article states outright the encryption is end-to-end. :)

That's based on Apple press releases from 2011 and 2012. See, for example:

http://www.apple.com/pr/library/2011/06/06New-Version-of-iOS... "secure end-to-end encryption"




Secure end to end encryption doesn't mean government agencies can't snoop on the coms. First of all, the CIA owns own one of the largest, if not the largest supercomputer. Also, the encryption could be using CIA's own root key. Example: http://www.cypherspace.org/adam/hacks/lotus-nsa-key.html




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: