Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You're misunderstanding the attack vector. The exploit is about precisely controlling the delta between a client and server.

There is no problem with using low-resolution time signatures as a cryptographic seed. Using time as an entropy source is only a problem if you sample at a lower resolution than your clock's error rate.



Maybe I wasn't clear, but I was thinking one would manipulate the delta specifically to cause the machine to adjust its clock.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: