Pinyata! I assume the goal is to exploit the CA certificate and decrypt the private key to the Bitcoin address, right?
-lee On Tue, Feb 10, 2015 at 1:38 PM, Patrick Connolly <[email protected]> wrote: > https://news.ycombinator.com/item?id=9027743 > > Would this be an interesting thing to put on a duplicate (...or production?) > system and publicize? > > Might be an interesting practise for creating a form of canary, especially > for projects that perhaps can't afford full and constant audits. > > Patrick > > -------------------------------------------- > Q: Why is this email [hopefully] five sentences or less? | A: > http://five.sentenc.es > > NOTE that my incoming emails are delayed from arriving in my inbox until 9am > daily. If you need to reach me sooner, please use other means of getting in > touch. #slowwebmovement > > > _______________________________________________ > List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev > To unsubscribe, email: [email protected] > _______________________________________________ List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev To unsubscribe, email: [email protected]
