Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

One thing to be careful is that you don't open yourself to a trival DOS. The default scrypt command line program will churn CPU for a full second when encrypting a file. If you use similar settings, it will not take an attacker many connections to reduce even a large cluster to tears.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: