Hacker News new | past | comments | ask | show | jobs | submit login

the software can easily be modified to display the hash you are expecting



To start, something is better than nothing. Long-term remote inbound two part authitacation combine with like measures for hardware via meta-programming would make bypassing this very, very hard for the average hacker.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: