Hacker News new | past | comments | ask | show | jobs | submit login

What is wrong with the method which vbezhenar suggested? (sibling comment of yours)



Considering how all master keys of most popular measures have been hacked, its natural to assume that government keys will be hacked and leacked too.


I think you are underestimating the ability of organizations to keep important private keys private.

Some examples are the code signing keys of most major desktop and mobile operating system vendors, the package signing keys of major Linux distributions, the SSL private keys of most banks and major e-commerce sites, and the certificate signing keys of most SSL certificate issuers.


Backdoor algorithms and operators cannot be reasonably trusted to not disclose the key or data.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: