Hacker News new | past | comments | ask | show | jobs | submit login

In most well designed systems the only keys that are useful are held in HSMs that won't export them to anyone, so you can't easily do that. You could at best sign a few things with the keys if you were able to compromise HSM credentials, but, once you were caught your access would be revoked along with anything you signed.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: