Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Many efforts have been started to have a middle ground, for example key escrow. However, key escrow might not be that different from allowing almost anyone to pwn your communications and data... that was a huge argument in the mid-1990s.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: