Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>There are many real-world use cases where, in order to accomplish the completion of a project, you need to provide an external resource with access to sensitive data for a limited amount of time.

Well, then there are many real world use case that are not doable in our version of reality, where data can be copied ad infinitum, and where you NEED to show the end user unencrypted data.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: