Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

While I see what you mean, I can't think of any example right away that are touted by people like Snowden - I see there were many honeypots on crypto, TOR and "encrypted" phones, but other than maybe VPNs I wouldn't know what was shared this way.


> I can't think of any example right away that are touted by people like Snowden

Then it worked perfectly.


In the sense of - are you talking about something or is it all just vague impressions?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: