Hacker News new | past | comments | ask | show | jobs | submit login

What exactly is your threat model?

In terms of technical implementations, Chrome naturally surpasses everything else in a naïve myopic comparison (and always will), but holistically a secure algorithm isn't going to protect you if you've voluntarily handed the keys to the kingdom to umpteen untrusted parties. Chrome gets all the technical details right in a context where doing so seems redundant.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: