Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
pastage
3 days ago
|
parent
|
context
|
favorite
| on:
Source code of Swedish e-government services has b...
You can start a signing process saying you are who ever owned that certificate. E.g. if you call someone. You can not use those signatures to gain access, and it is rather in phishing.
help
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: