Hacker News new | past | comments | ask | show | jobs | submit login

I'm afraid that the most pragmatic answer is indeed to encrypt your traffic. Use reverse ssh tunnels, use VPN tunnels, get involved in such efforts and you will find many others doing the same. It might be up to the users to maintain their own privacy.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: