Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>To prove that the competition was fair, we will add a command that returns the keys used for encryption as soon as a winner is announced.

So, using a bug-prone process (software development) we will alter the software after the fact to introduce a feature which, if it escapes the sandbox and gets into the wrong build, will potentially reveal the secret keys of all users.

Am I reading that right?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: