Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The same vulnerability that would exist in the hash calculator could exist in the hash calculator locally to induce data loss, theft, etc. The same security challenges that face a hash algorithm in a browser affect encryption ability as well. Presumably the decryption happens in the browser as well which would preclude your post.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: