Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think jahnu was referring to obtaining the private keys for a trusted signing authority, which would enable said agency to create valid-looking certificates for the purpose of MITM. Weak algorithms are also concerning, but not really the subject of OP.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: