Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Almost sounds like “zero trust” is classic HTTPS authentication with extra marketing added…


There's a significant difference which my original message hints at and is subsequently clarified: there's still an intermediary. If there's an exploit in the service, like this case, it's still not directly exposed. The intermediary device is still sitting in between and won't allow any old traffic through without separate authorization




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: