Hacker News new | past | comments | ask | show | jobs | submit login

Good point. Assuming that the offending code is the actual password storage rather than an intermediary subsystem, one can safely make the assumption that such password storage is insecure. Which isn't much of a revelation, considering the article.



Maybe true, but I've learned not to make assumptions about how large & complex systems work based only on the little piece I can see from the outside.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: