Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I guess you're right. The mechanism is forward-secure, which means for an attacker that tampering the logs is the first thing to do, not the last ;-)

As soon as the attacker manages to extract the state of the key generator from memory at one point of time, the log entries from that and the following sealing periods can be modified and cleanly sealed.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: