Hacker News new | past | comments | ask | show | jobs | submit login

I consider it more to be a 'why oh why do these protocols continue to be designed and specified in such a way as to be known to be vulnerable to eavesdropping' kind of comment.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: