Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I strongly recommend not relying on the VPN written in C that nobody's heard of that uses a hand-rolled custom RSA authentication algorithm to authenticate connections for your perimeter security.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: