Comment by lazide
14 days ago
No, that would be trivial to verify with any other operating system.
Key ring contents (and what is done with them) are typically much harder to verify as they’re encrypted.
14 days ago
No, that would be trivial to verify with any other operating system.
Key ring contents (and what is done with them) are typically much harder to verify as they’re encrypted.
No comments yet
Contribute on Hacker News ↗