Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you sync your TrueCrypt volume to Dropbox or other cloud storage (an excellent use case for TrueCrypt, by the way), a backdoor could be exploited by whoever has access to the Internet traffic or the servers.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: