Hacker News new | past | comments | ask | show | jobs | submit login

In your threat model take into consideration that there was a "secure phone" sold with an IM app that turned out to be backdoored by the author in cooperation with FBI.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact