Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> it will be the easiest thing in the world to detect if anyone tries sending it over the open internet.

And how shall "goverment sanctioned encryption" be distinguished from "non sanctioned encryption"? The point of (good) encryption is to make the result look like stochastically random bytes.



If government can demand the keys, they can take them and decrypt it.

You could claim you are sending packets of random bytes for no reason to a friend, but I doubt any jury would believe you.


> If government can demand the keys, they can take them and decrypt it.

The question isn't how its decrypted, the question is how to determine WHICH traffic to decrypt in order to inspect it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: