Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you have the ability to install a keylogger that can hijack a user session, what prevents you from capturing the SSH key of the user?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: