Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The issue with #3 in practice is that roll your own tends to have its own undiscovered bugs and winds up being security by obscurity in practice unfortunately. There is a reason best practices for Cryptography involve throughly tested algorithims as opposed to just "the latest and greatest".

If you can audit completely enough to not leave anything then the question becomes why not audit the commodity? Lack of availability of auditable components or proportionate costs of doing so is the main answer I can think of.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: