Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Any new term you come up with, will end up being misused by marketers.


End-to-end encryption doesn't mean anything where it is semi-validly used. It's used on phones, where you as a user (or company) don't control what code executes. For example, WhatsApp was end-to-end encrypted. Well, it doesn't actually provide security because with either physical access to the phone or if you have if you can use the app store to "upgrade" the app, you can upload code to the phone. You can upload an apk that replaces the WhatsApp app. It even still uploads the messages to a central server so you can get those messages from Meta, then get the key from the phone some time later or earlier and use the key to decrypt it when the message is already erased from the phone.

(aside from the fact that people don't seem to know/remember WhatsApp backs up to google drive)

Code that then gets access to the end-to-end encryption keys ... so you're not safe from state actors, you're not safe from police, you're not safe from the authors of the code and you're not safe from anyone who has physical access to your phone.


Yes, the government can also just implant tiny cameras in your eyeballs and just record everything you see anyway, so you’re not safe.


FWIW that's the initial plot for the Ghost In The Shell: Stand Alone Complex (2002) animated series.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: