Comment by neilv
6 months ago
> However, how do you square that with the proof, time and again, that truly secure and encrypted networks are primarily use by criminals
Do you have a URL for this proof?
(If it's true, that would be good to know.)
6 months ago
> However, how do you square that with the proof, time and again, that truly secure and encrypted networks are primarily use by criminals
Do you have a URL for this proof?
(If it's true, that would be good to know.)
No comments yet
Contribute on Hacker News ↗