logoalt Hacker News

qurrenyesterday at 9:48 PM1 replyview on HN

... and hold participants' private keys truly private, which you cannot verify without a rooted phone.


Replies

microtonaltoday at 5:39 AM

You don’t need a rooted phone. An open source OS with reproducible builds is enough. That way you can validate what the code does without giving up verified boot, or opening up another attack vector, etc.