logoalt Hacker News

cwillutoday at 2:12 AM1 replyview on HN

The ends still have the decryption keys, so the result is the same as with a physical letter: you have to acquire the physical object holding the key material.


Replies

Muromectoday at 6:40 AM

The result is not the same as a physical letter, as you can intercept those covertly (which is resource constrained)