Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You wouldn't just have to verify if it produces the same encrypted output, but also if all the steps along the way are carried out in precisely the same manner. A compromised version of TC may correctly encrypt the volume as expected, but also leak the key or the encryption password on the sly.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: