Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You're welcome to run any algorithm you want with paper and pencil, but you might not be able to run them on your devices that are allowed to talk to cellular networks.

Communications that look encrypted can also be straightforwardly flagged and logged for a closer look, perhaps keeping a closer watch on any cleartext messages, metadata that invariably leaks, etc



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: