Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't agree that installing a key logger (of which there are hundreds out there) and stealing the encrypted password files is in any way harder than logging lo0 and waiting for passwords to slowly trickle in while they're being used.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: