Hacker News new | past | comments | ask | show | jobs | submit login

I read that too, and I am mystified that they could make such a broad claim, when clearly their technique applies only very narrowly, i.e. to a process leaking its own secrets by encoding them in its own timing behavior. It's very poorly worded.

Applications are open for YC Winter 2022

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact