Comment by lazide
4 hours ago
No, that would be trivial to verify with any other operating system.
Key ring contents (and what is done with them) are typically much harder to verify as they’re encrypted.
4 hours ago
No, that would be trivial to verify with any other operating system.
Key ring contents (and what is done with them) are typically much harder to verify as they’re encrypted.
No comments yet
Contribute on Hacker News ↗