Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I believe his point is built upon the fact that his MAC is hashed and therefore his data is able to be traced back to him


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: