Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I see the problem in theory, but in reality, the time of a couple of hash functions compared to network latency and application server routing would be quite small. Can timing attacks actually work in such situations?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: