Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, this is a bad example, considering public/private key pairs exist,

and work for identity validation,

as long as you don't farm it out to a cheap, know-nothing vendor.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: