Comment by ornornor Comment by ornornor 3 days ago 2 replies Copy Link View on Hacker News Your data has to be decrypted somewhere to be useable, how would that work?
at the endpoints