Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The devices could exchange their keys through a secure connection - be it direct (Bluetooth, LAN) or routed by a third-party service. It could also be transferred physically (through removable storage, or through retyping a bunch of numbers shown on one device into another device).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: