Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's not implied; the article states outright the encryption is end-to-end. :)

That's based on Apple press releases from 2011 and 2012. See, for example:

http://www.apple.com/pr/library/2011/06/06New-Version-of-iOS... "secure end-to-end encryption"



Secure end to end encryption doesn't mean government agencies can't snoop on the coms. First of all, the CIA owns own one of the largest, if not the largest supercomputer. Also, the encryption could be using CIA's own root key. Example: http://www.cypherspace.org/adam/hacks/lotus-nsa-key.html




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: