Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Most likely a key management/distribution scheme is used and that is what's been cracked. They obtain the key and then are able to decrypt the traffic as normal, no actual encryption is being cracked.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: