Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Depends on who your adversary is and how much you trust their protocol (some weird homegrown thing with clever/questionable cryptographic choices, the last time I checked) and implementation. Your texts don't generally run through Telegram's infrastructure, for example.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: