Hacker News new | past | comments | ask | show | jobs | submit login

The cryptography here is likely sound, but motivated actors have other tools, like traffic analysis (how much data and the timestamp at which it was downloaded), that could help narrow things down to few enough targets to investigate each more thoroughly. The more traffic with similar data sizes at the same time the harder it will be, of course.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: