Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

My issue is the confidence with which the author presupposes that the existence of this code on sites indicates seizure or utilization in an investigation. It is a lazy position that leaves others (i.e. HN readers in this thread) with a little more intellectual horsepower to evaluate the other - and frankly more realistic - alternatives.


What are the more realistic alternatives?



Please refer to the (current) top comment.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: