Hacker News new | past | comments | ask | show | jobs | submit login

This isn't true. A trivial example of a significant difference in which they would still interoperate would be a binary distributed version which phones home the shared key.



Then it’s still end to end encrypted. It’s just that one side is compromised.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: