Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The data can easily be well encrypted while the enduser retains full control.

And if it's really just about the data it doesn't matter if the machine gets stolen if it's properly encrypted.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: