Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yup, but even in cases where the expense of a proper HSM isn't warranted, you can set up a software solution/process that works in a similar manner to a HSM, just with less tamper-resistance.


Of course even if you have HSMs there is still the issue of controlling access to the HSMs!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: