Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Thanks for the information!

Actually I think I've read something about the different levels of SSL. I suppose it's possible to somehow limit the available modes, to avoid exposing vulnerabilities.

an attacker only needs to find one screwy CA in order to pretend to be whoever he wants.

- What's a screwy CA, and how does the pretending work? .. If it's possible to describe roughly.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: