Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Mainly cryptographic keys like the SSH host key, or stored RNG state. But this can very easily be mitigated using `cloud-init` or similar.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: