Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Presumably you enter dummy data to validate first. What if it doesn’t send that, but does send the real data?


Then I'd change the keys in that rare circumstance. What are the chances the attacker will be able to take advantage of the leak before I have a chance to change them, particularly given an attack like this would likely be a blanket attack and not targeted?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: