Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So how does that work if you are using an encryption method that allows plausible-deniability?

"Legally, you must give us the key which probably does not exist"



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: