Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You can start a signing process saying you are who ever owned that certificate. E.g. if you call someone. You can not use those signatures to gain access, and it is rather in phishing.
 help



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: