Hacker Newsnew | past | comments | ask | show | jobs | submit | sft's commentslogin

Isn't this similar to the Proto Indo European expansion across the Eurasian steppe?


As if they could, even if they wanted to.


This


I wish they would stop calling it End-to-End, it's misleading, they don't talk about DNS at all. One weak link in the chain means the entire chain is weak.


DNS is not relevant at all here. Your email is encrypted client-side at one end, and decrypted client-side at the other end. At no point in between does it exist in cleartext. If there is some DNS vulnerability that causes your email to get intercepted, that in no way compromises the encryption.


Here? Where is here? The blog mentions nothing about email specifically.


Whatever. "here" is any text encrypted by this module, whether it is the body of an email or something else. The data isn't getting decrypted mid-stream, it goes from one client (or "end") to another. It is end to end encryption, and DNS has nothing to do with it.


can someone explain how we can save threads within our HN accounts? it's not immediately obvious


Google and others rarely ever mention DNS/DNSSEC, even though just as much information is being sent insecurely in the form of DNS queries/responses.

Learn more:

https://github.com/jedisct1/dnscrypt-proxy

http://dnscrypt.org/

Check if you already have it enabled (unlikely if this is the first time you're learning about this) http://test.dnssec-or-not.com/


Is this working for everyone else? I get a "server not found" message.

http://downforeveryoneorjustme.com/http://test.dnssec-or-not... tells me that the server is up.


working fine here

there are others to check if you have it (I'm pretty sure you won't unless you have explicitly set it up yourself)

google 'DNSSEC test'

btw setting up DNSCrypt-proxy takes all of 10 minutes on Windows


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: