Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> However, how do you square that with the proof, time and again, that truly secure and encrypted networks are primarily use by criminals

Do you have a URL for this proof?

(If it's true, that would be good to know.)



Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact