Hacker News new | past | comments | ask | show | jobs | submit login

I know the hashes exist, but they're not used on traffic in transit except in very unusual circumstances. They're used by web hosting companies/dedicated server providers/VPS hosting companies etc to examine the disk/storage device contents of a suspicious server against a known list of the hashes of previously-seized CP.



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: