Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The only foolproof way to get around this is to hardcode the certificate into the application itself, or at least the intermediate chain. Otherwise, you could have always intercepted the first request and made that the certificate of record.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: