Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you have the DB, then bugs, malware, algorithm weaknesses, insider attacks on the code or operational failures on my part could compromise all my stored secrets.

If you don't have the DB, they can't.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: