Hacker News new | past | comments | ask | show | jobs | submit login

But that additional access would probably include various keys that would let them decrypt previous communication. Maybe the order was to log passwords on login, or something like that, that would allow recovery of the key and decryption of stored data, which may not be possible depending on the original architecture of the system.



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: