Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you don't control it, treat it as virtually public. I do that with Skype, Gmail, Google Docs, iCloud stuff, Evernote, Dropbox etc.

Don't trust it if you can't encrypt it with a private key.



What IM protocol do you use? Or do you simply restrict all sensitive communication to encrypted email?


Lync is used by a lot of enterprises.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: