Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

From my brief reading of the spec, the three modes are mostly just a matter of where the keys are generated and stored. I think the messages themselves are indifferent to the mode (and therefore intermediaries can't determine between the three).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: