Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> An attacker with local root can just extract the wireguard keys from process memory, or use the TPM to decrypt the state file like Tailscale would.

That was my point :)





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: