Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
grotorea
on Dec 7, 2023
|
parent
|
context
|
favorite
| on:
Untrusted Device Encryption
Maybe a better example might be wanting to use a smartphone as the always on sync endpoint. The phone can easily be stolen but with this feature it won't contain the valuable data.
Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: