Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Every ‘lawful access’ proposal eventually becomes either a backdoor (which attackers also get) or targeted exploitation (which doesn’t scale and incentivizes stockpiling 0-days). The technical reality doesn’t bend to policy language.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: