Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If a (co)processor, firmware, battery, daughterboard, memory, (really anything on the north/south bridge), UEFI certs or code, harddrive, OS, microcodes, transistor doping amounts, protocols, touchscreen, drivers, services or crypto standards have either flaws or backdoors the encryption could be circumvented. Apologies for the incomplete list.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: