Hacker News new | past | comments | ask | show | jobs | submit login

Then the terrorists would just use non-encrypted communications and blend in with the massive flow of everyday data...

...Unless you're intercepting and sniffing everything that's unencrypted. Then we're back to square one.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: