Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Let me rephrase with a quote from the public-key cryptography wiki:

"An attacker who could subvert any single one of those certificate authorities into issuing a certificate for a bogus public key could then mount a "man-in-the-middle" attack as easily as if the certificate scheme were not used at all."



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: