Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The article is somewhat light on content. There are standard protocols for HSM use. What is the reason you didn't use these? There are clear risks involved with inventing your own security related protocols.


We have a really long technical blog post coming tomorrow. Agree that inventing protocols is dangerous so we got iSEC Partners/Matasano to evaluate.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: