Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That still only proves your side of the communication. (Which has nothing to do with the encryption scheme, just with posession)

The other side is identified by a phone number. "Don't use your own phone number" is fairly good advice if you engage in interactions that are high-value enough that anybody would both physically obtain a device and deidentify a phone number.

It certainly doesn't make you magically more identifiable than other message exchange mechanisms.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: