Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

OK, so get out Wireshark and have a peek for yourself. Figure out how to decode the data in the responses returned from the server (I'm sure it's not much more than maybe binary packages of metadata transmitted over SSL) and examine it until you're confident.

http://ask.wireshark.org/questions/16788/wireshark-decrypt-s... http://computer-forensics.sans.org/blog/2009/03/10/pulling-b... should help get you started.

"The great thing about facts is that they're true whether you believe them or not"

Also, Notch has "confirmed" this (if you trust him more than a sketchy anon source that RockPaperShotgun has stated that they've verified) https://twitter.com/notch/status/311535572596432896



Thanks for the links. I wasn't clear. I didn't mean to imply that what the source was saying is not possible. Since I wasn't familiar with the credibility of RPS (which I now hear is very credible), I just felt like reading the article didn't tell me anything concrete.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: