Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Cryptographic functions for example. Today they might be cutting edge, but tomorrow someone might have found a critical exploit or the hardware has just become too powerful.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: