Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Once the data is out of your possession it's out of your control.

Actually, once your e2e key that encrypts your data is out of your possession, it's out of your control.

Over the past decade it's become commercially feasible to be NSL-proof.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: