Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It could also be built using the Signal model.


Get funded indirectly by the NSA to undermine effective cryptosystems?


Sorry, what? Source?

We’re not still confusing bypassing encryption by compromising device security with “[undermining] effective cryptosystems” like those articles when everyone was leaving WhatsApp?




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: