HN2new | past | comments | ask | show | jobs | submitlogin

That's assuming the clients are not compromised, hardware is not compromized, and "whatever protocol" is not susceptible to man-in-the-middle attacks.


If the hardware is compromised then all bets are off. No protocol is secure when running on compromised hardware.


Not really, you can have good enough security without perfect technology.

Cost to acquire or develop and reliably productize (and risk divulging) targeted attacks for OTR would likely exceed the value your adversaries could extract from your chat with your mom.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: