Pinyata!

I assume the goal is to exploit the CA certificate and decrypt the
private key to the Bitcoin address, right?

-lee

On Tue, Feb 10, 2015 at 1:38 PM, Patrick Connolly
<[email protected]> wrote:
> https://news.ycombinator.com/item?id=9027743
>
> Would this be an interesting thing to put on a duplicate (...or production?)
> system and publicize?
>
> Might be an interesting practise for creating a form of canary, especially
> for projects that perhaps can't afford full and constant audits.
>
> Patrick
>
> --------------------------------------------
> Q: Why is this email [hopefully] five sentences or less? | A:
> http://five.sentenc.es
>
> NOTE that my incoming emails are delayed from arriving in my inbox until 9am
> daily. If you need to reach me sooner, please use other means of getting in
> touch. #slowwebmovement
>
>
> _______________________________________________
> List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev
> To unsubscribe, email:  [email protected]
>
_______________________________________________
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev
To unsubscribe, email:  [email protected]

Reply via email to