Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Lawful intercept does not provide encryption keys. The two are much different.


just for the "well-written specification" by timguoqk ,the Lawful interception alse include," If the data are not obtained in real-time, the activity is referred to as access to retained data (RD)", by the way,according the link cited by others(http://www.theverge.com/2015/12/27/10670346/china-passes-law...),“the new law does not require that companies operating in China hand over encryption keys” why all the guys just believe what they want to believe?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: