Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If my setup is secure enough that someone has to break SGX on my laptop to beat it, that's good enough for me. What is your threat model anyway?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: