Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

As pointed out in a sibling comment, the result set is also encrypted, so matches with abuse images, even if there are some in Apple's POI database, can't be used to implement the scheme as you suggest.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: