Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So if that entity wants, they can boot you off and pretend to be you.

They could shut you down, but I don't think they could pretend to be you since they don't have your private key..



That's my point; it's why I prefer public/private keys as ids instead of network addresses.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: