Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's interesting that all the work being done on this "secure" phone is being done on non-secure hardware and networks. Presumably if interested parties think this is a threat, they can access all comms/data about this new phone, inject themselves where they see fit and compromise the final product.

Oh, and never mind compromising the people involved.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: