Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> What they should say is, they will never transfer the unencrypted data to a third party, and will never enable a third party with the encrypted data to decrypt it.

Doesn't really work... they can send the encrypted data to Y and the encryption key to Z so that Y and Z can make their own agreements.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: