Lemus @ 03.05.18, 23:10
Immediately I do not remember
Here, the Council for the Future: first remember - then they argue.
So that there are no extra questions)
Lemus @ 03.05.18, 23:10
that the unopened code can and password to overeat, and the firewall to deceive if it is sharpened. is not it ?
Code of them in itself steals and deceives?
Lemus @ 03.05.18, 23:10
Your Xprivacy will be able to catch it
Example?
Lemus @ 03.05.18, 23:10
And for example, by external code request
Firstly, what does it differ from the "internal code request"?
Secondly, who forbidden to use the entire manifold of protection tools from the cap?
RUIZ_AV @ 04.05.18, 02:35
Anal cryptanalysis used in some cases is hacking any encryption in a few minutes.
In this case, you need to have options for plausible denial or container steganography, or think about cloud encryption. Encryption itself does not go anywhere, but it creates the illusion of its absence.
Post has been editedokouser - 04.05.18, 13:55