Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Can you decribe a mechanism to verify that users in an alleged leak are the same users as your own?

What I offered was the mechanism I would use to solve this problem, which is a probabilistic approach rather than a deterministic approach. What you described is likely infeasible and impossible, so rather than get blocked on that, I moved to an alternative angle.



What is the mechanism? I don't see anything in the comment sorry. Maybe state it simply so I can follow along.


There is no need for a mechanism in this case; building such a thing would be a waste of time.

Honestly, I was trying to respond to your question, and perhaps I was too terse. But I don’t think the mechanism you ask for is possible (or desirable) today. In a future scenario with some type of universal identity there would probably be no need for such a mechanism.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: