Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In the press release Apple says they are using hashes of hashes.

Apple has no visibility into the original image that generated the hash, so the gov can compromise the list at the source and Apple would have plausible deniability.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: