Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Wow, thanks for demonstrating this. A dead simple technique like this could have compromised me when trying to use SSH pseudonymously.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: