Hacker News new | past | comments | ask | show | jobs | submit login

You serve it on the person who operates the communications technology they are using, or a person who will use the warrant to lawfully break into the premises where they’ll be speaking and install a bug.

In theory, end-to-end encryption should not be vulnerable to this, as long as you verify your friend’s key in person and trust the software not to let it change without warning you. Nothing distributed through an app store can be this trustworthy.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: