Hacker News new | past | comments | ask | show | jobs | submit login

Token binding was the closest we had - still lets a compromised endpoint in the right position steal and use the tokens from that device, but it's at least not persistent.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: