Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If the attacker "0wned" the servers the fact there was encryption between you and the server doesn't really help a whole lot, they can just insert them selves in the stack post encryption (or even use the private key to decrypt the encrypted traffic if they wanted to minimize the number of points they touched).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: