Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The keys would be in the same process as the one doing the SSL in the first place, and that is the part that is vulnerable.

Even communicating over IPC you would still be vulnerable.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: