Hacker News new | past | comments | ask | show | jobs | submit login

What does that even mean?



Telegram is just the middleman between sender and receiver. When you write on HN, the receiver is HN. That message is transported via E2E https encryption so it's secure. But because HN displays all messages publicly you can read them after they were received.

This doesn't change the fact that the transport as such is E2E.


There is a distinction between TLS and E2EE. E2EE is client to client encryption.


Ideally it would be the human at each end doing the encrypting and decrypting. But humans can't be bothered, so we let some code that we know very little about do it for us. Obviously having that code run on the client device (the one in your hand) is preferable to having it run elsewhere (like some web server), but either way the human (the true end) is delegating the job to an entity that isn't quite at the end, it's ever so slightly toward the center.

Things like PGP help to maximize the endianness, since the human has a better sense that the crypto software is legitimate, and can read the code before executing it, although there's still plenty of points of compromise between that code and the human (compiler, Intel ME, etc.) so unless you're doing crypto with a pencil and paper, you're always putting your trust somewhere that isn't precisely the "end."


That your message is transferred from your computer to the recipient, HN's servers, encrypted. At no point should anyone in the middle be able to read your message. After arrival, HN then publishes it on a public forum for everyone to see.



Kind of, but as they aren't lying about allowing private conversations not really. More saying https is end to end encrypted, but what one end does with that data isn't necessarily private.


https on its own isn't e2ee:

>End-to-end encryption (E2EE) is a system of communication where *only the communicating users can read the messages*. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, *and even the provider of the communication service* – from being able to access the cryptographic keys needed to decrypt the conversation.[1]

If the server can read the content, it isn't end-to-end encryption.

[1]: https://en.wikipedia.org/wiki/End-to-end_encryption


The server is the communicating user in this instance, it is the intended recipient of the message. No potential eavesdropping can happen.

Even though I intend for you to read this message, I am sending it to the HN server to post publicly. My communication with HN is E2EE, my communication with you is not. This isn't meant to be useful information, and it certainly isn't advice. It's just an accurate nonstandard way of looking at things.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: