Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And if you were aware that a state-level actor is targeting you, you'd be using a programmable, self-contained HSM for all sensitive computation. This is a topic I'm working on actually.


That sounds interesting. Do you have anything you could share on the topic ?


It's still in the early stages honestly. I will probably share more after the first paper is published.


You mis-spelled "iphone."



You have no idea what you're talking about mate. As a state-level actor, I could obtain/develop a nice Safari root exploit and get the target to visit a malicious site. Heck, if I were the NSA, I could probably get Facebook to insert the exploit payload once the target logs in. Game over.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: