Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's stuff there about cryptography too, but the logging is about metadata.

For metadata things are the opposite of your logic. It is always accessible. Whatever protocol you create to hide it, will have holes; Math dictates it.



Is that true though? I thought the point of protocols like Tor was that it makes gathering the metadata very very expensive.


Yes, expensive. That means it's perfectly doable (and was already done a few times).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: