Hacker News new | past | comments | ask | show | jobs | submit login

You serve it on the person who operates the communications technology they are using, or a person who will use the warrant to lawfully break into the premises where they’ll be speaking and install a bug.

In theory, end-to-end encryption should not be vulnerable to this, as long as you verify your friend’s key in person and trust the software not to let it change without warning you. Nothing distributed through an app store can be this trustworthy.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: