Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Anything that can be used to prove a document's integrity can generally also be used to identify where it came from and how it was produced, which is why we generally don't see any effort to do this at all.

In fact, plenty of things that can't prove a document's integrity can also be used to identify its source, which is why this isn't done; you can't be sure that you've sanitized the document enough to protect the leaker.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: