Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I do not think (1) is solved with cryptography because you can spy on the traffic flow and the route and timing of the connections give extra information. To overcome this we need extra measures.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: