Comment by dietr1ch
4 months ago
They are so used to bend reality that could easily call it e2e encryption even if the key was generated by Google or had a skew that made it vulnerable with some extra knowledge that they have or will have in the next sync.
No comments yet
Contribute on Hacker News ↗