Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think he should have encrypted the key using itself. That way he can give them the key. And they can decrypt it and send it back in time so they can decrypt it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: