Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The tool doesn't matter so much, if something is encrypted with, say, AES and a specific mode of operation with one tool, it can be decrypted with a separate tool given the same key and mode. Assuming the implementations of the encryption and decryption are done properly.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: