Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
tedunangst
on May 14, 2018
|
parent
|
context
|
favorite
| on:
EFail – Vulnerabilities in end-to-end encryption t...
This is difficult if the input is a nonseekable stream, but that doesn't excuse producing bad output.
tptacek
on May 14, 2018
[–]
That's why I didn't suggest it, but to be fair, you could tee the stream into an intermediate file for a two-pass scheme.
Join us for
AI Startup School
this June 16-17 in San Francisco!
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: