Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The thing is even the most secure facilities need ingress and egress points.

Those are weaknesses. It’s also that a root rotation might be needed for completely stupid vulnerabilities. Like years later finding that specific key was generated incorrectly.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: