Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't think it solves same problem.


it does not solve the same problem, correct. it's still a great tool if your threat model warrants it.


Can you give an example of a threat model that would warrant it?


You’re a journalist. Source gives you a usb drive full of documents. Source is in reality hostile/compromised, so is the usb drive.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: