Comment by vishnumohandas
5 years ago
No, the client has to first verify their email address and 2FA (if configured) to receive the encrypted keys. In addition to this the decryption is time-consuming.
5 years ago
No, the client has to first verify their email address and 2FA (if configured) to receive the encrypted keys. In addition to this the decryption is time-consuming.
No comments yet
Contribute on Hacker News ↗