Hacker News new | past | comments | ask | show | jobs | submit login

I wonder, how would one find out such backdoors at the CPU level? And also, are Snowden's leaked documents archived somewhere?



Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: