Hacker News new | past | comments | ask | show | jobs | submit login

It is documented in the research paper linked from the site, yeah. The big contribution with this protocol is that every authenticated datagram represents an idempotent operation on the recipient, so we don't have to worry about replay attacks as such.

I'm not sure how a terminal session can use only idempotent operations, but it sounds cool. I'll have to read the paper!

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact