Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Lets say for example

Bob, Jon, and Tom have pieces of the key. Bob and Jon are in the US and arrested over and commanded by a court to give up the key. Tom is the holdout. The US will issue an international arrest warrant, and now Tom can never safely fly again or the plane will be diverted to the nearest US friendly airport where they will be extradited. So, yea, "safe" is very situational here.



Doesn't Tom's key fragment have to be on a disk somewhere for things to work?

That's the actual weak link to attack.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: