Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
thebean11
6y ago
0 comments
Share
That's a much less scary attack vector though, since they would also need to somehow impersonate the participants voice or image right?
0 comments
default
newest
oldest
upofadown
6y ago
Think of it as aiming a phone at another phone. Apple would decrypt everything and then reencrypt it.
j
/
k
navigate · click thread line to collapse