Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What this means is that the keys are not stored in non-recoverable hardware, they are available to a regular server process, just some compiled code, running in an elevated-priv environment. There is no mention that the systems that had access to this key were in any other than the normal production environment, so we may extrapolate that any production machine could get access to it and therefore anyone with access to that environment could potentially exfil the key material.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: