Hacker News new | past | comments | ask | show | jobs | submit login

You should scan on the device before it goes on the network. P2P networking or not, the app should include a scanner.

Even if you use an open-source clone without scanner, your contacts most likely will use an app with builtin scanner. Your communications will be scanned on their end.

At that point I'm wondering why we don't also open and scan regular mail at the post office before delivery.




> At that point I'm wondering why we don't also open and scan regular mail at the post office before delivery.

We do open and scan some percentage of regular mail at the post office. It's difficult to find exact sources because the USPS only seems to easily admit to doing it for postage reasons, but it's fairly well known that they search for drugs, bombs, etc. Mail is subject to X-ray scanning and being opened under suspicion of a variety of things happening. When they can't open it themselves, they're also allowed to request permission from the recipient (you can refuse, but then they can go to a judge).


X-Raying import of goods is one thing. What I'm thinking about is more opening letters to read writings and check pictures, without explicit permission nor judge involved.


This is exactly what parent is describing. If you’re on a suspicious person list, or happen to cross paths with one, your mail is likely going to be scanned. I can’t find the source now, but also once read the NSA can intercept a package, modify the contents and send it’s on its way without even a delay in the tracking.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: