Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm going to guess that the algorithm behind key generation is "record a series of random bytes (from a truly random source): that's a new key". Pretty hard to crack.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: