Hacker Newsnew | past | comments | ask | show | jobs | submit | nmelo's commentslogin

When a GPU training server gets compromised, the first question is always: what credentials were on that box, and where could they go? SSH keys scattered across hundreds of nodes. Service accounts with static secrets. Nobody knows exactly what exists on which machines.

Hardware-attested credentials eliminate this question. Credentials bound to verified hardware cannot be extracted or moved. The trust anchor is silicon, not software.


We heard from a few sec engineers in our team that's there's no great open database of security incidents

Over the past 2 months a few people in my team have been manually building one from public data. It's in early stages, but plan to keep it free.


Interesting concept! For the JS snippet, what's the performance impact? I've had some past experiences with third-party scripts slowing down our page loads


It is not much different than a google analytics snippet. We havent seen any issues so far


In the same way a self-signed certificate doesn't need to be signed by an official root of trust to be useful for authentication, a self-signed Personal CA doesn't need to be signed or cross-signed by another CA to be trusted by a server.


I'm a little confused, can you help me understand something?

Assume you created a self-signed personal certificate and you use that to sign your emails.

What if I make a self-signed cert claiming to be you, and create an email address nmelo@gmail.com.

How would someone know which one to trust if there wasn't a third party to verify youre the real nmelo? Websites do this with trusted CA roots on their browsers.

Going back further, business do it with services like Dun & Bradstreet.

But personal?

What am I missing?


Absolutely. The important part is that certificates don't necessarily need to encode any personal information to be immediately useful as a factor of authentication. The fact that a person controls the private key associated with the certificate should be enough to allow any given server to trust the certificate, if they have enough confidence that the private key is being securely stored by the user.

Now extend that to a personal certificate authority. As long as the server is able to trust that the Root Certificate, and any Intermediates certs in that CA are controlled by the user, they should be able to trust certificates signed by that CA to authenticate that person.


Thanks for explaining, would you mind answering a follow-up?

> the fact that a person controls the private key associated with the certificate should be enough

Going back to my example, of you and I both claiming to be the same person with our certificates, us both having a private key doesn't solve this problem. Who authenticates who is the real person? Or is that not the point of certificates?

> if they have enough confidence that the private key is being securely stored by the user

Or... is it that a self-signed cert just proves who owns the private key, and I'm putting to much into what a cert is supposed to be?

> and any Intermediates certs in that CA are controlled by the user,

ah, ok, so I can act as my own CA because I have the private key for the root of trust.


TJ Jermoluk used to be CEO of @Home Networks, President and COO at Silicon Graphics and General Partner at KPCB.


So why is he relevant to "the Future of Authentication"?

I could see Martin Hellman being relevant, maybe. But there's no real substance in this piece, certainly not from Jermoluk. What I got out of it is that PKI is the answer. As I think DNS-based PKI is the answer, I think he's not too far, but he's probably selling something I don't need or want.


What do you mean by DNS-based PKI? That sounds interesting, but I can't quite visualize what that is.


There are two options:

  - registries and registrars run name-constrained CAs

  - DNSSEC/DANE (RFC 6698 https://tools.ietf.org/html/rfc6698)


I’m guessing using CERT resource records, that however doesn’t solve how you establish the chain of trust really.


Because that’s what his new startup Beyond Identity does.


CommandScape | Software Engineers | Palm Beach, FL | ONSITE, Fulltime, http://commandscape.com

CommandScape is a startup in South Florida with working to provide fully secure integrated Building Management Systems (Automated Buildings and Homes). The company is building advanced hardware and software systems that use Internet-standard cyber security throughout to manage, monitor, and automate the essential needs of a commercial building or private residence. The products employ a single suite of intuitive and easy-to-use applications that work transparently and securely from anywhere in the world.


All of the above?


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: