Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What's funny is that, in all these orgs, it ends up being the low-tech vulns that compromise you in the end. Physical access, social engineering, etc. However, I'm really impressed by the technical lengths Apples goes to though. The key-burning thing reminds me of ICANN' Root KSK Ceremonies.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: