Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Theoretically you could use secure boot with custom keys to ensure that your boot chain is not modified and you could use TPM for SSH host keys storage to ensure that it's not possible to copy them.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: