Hacker News new | past | comments | ask | show | jobs | submit login

Nobody wants to MITM every conversation, they want to MITM the conversations of valuable targets. This can be done at scale without breaking any cryptosystem, and with low probability of detection, by a well-resourced actor in possession of private keys that are ostensibly controlled by Apple and/or Google.

No prizes for guessing entities that fit this description.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: