Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>Telegram looks great on this chart because of policy, not technology.

This is what puzzles me about Apple, they absolutely have the capability to mitm iMessage pretty discreetly. Because Apple just completely hand waves away key distribution and they can silently add and remove keys at their leisure it's largely only policy that underpins their security. They're not Telegram, they aren't structured to be in a position to be able to ignore demands from the justice system to assist with some agent's latest fishing expidition. How are they getting away with not providing stuff that they obviously have access to? The PDF lists "Pen Register: no capability"



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: