Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The State is the one that must have no expectations of privacy and in fact be held to rigorous transparency an independent audit, not the other way around.

Like in software, security that relies on closed source is in fact more vulnerable.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: