Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I hope you did not just assume that general purpose computing and device ownership can be subverted by mere certificate pinning.

If it's executing on my device, you can be sure I can poke it and see what it's doing.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: