Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How about this scenario.. there is now a common unified interface for all computers. If a vulnerability is discovered then all systems are vulnerable and must be patched. How are those patches delivered? It's protection may lie with a single signing-key. How well controlled is that signing key?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: