Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

One threat model with that kind of approach is that once a visitor possesses your key -- even if they return it -- you can't tell how many copies they may have made.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: