Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> With that access you can also "do" things, like sending messages or delete stuff.

If you break E2E encryption, you can likely also impersonate and "do" things.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: