Comment by pfortuny
4 years ago
They can perfectly do that without recurring to sending the hashes, using asymmetric cryptography.
But... this way the also gather some data.
4 years ago
They can perfectly do that without recurring to sending the hashes, using asymmetric cryptography.
But... this way the also gather some data.
No comments yet
Contribute on Hacker News ↗