Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But those "obstacles" and "hurdles" can themselves be exploited in some cases. If they're software-based, then they can just end up making the attack surface much larger.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: