Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

From the article (emphasis added):

“The threat actor was also able to copy a backup of customer vault data from the encrypted storage container which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs …”



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: