Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Serious question, if a surveillance organization had control of a certificate authority trusted by your client, would that allow them access to traffic whose security relied on a certificate from that authority?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: