Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> It’s giving control of JIT to third parties

Any real-world examples demonstrating how it's insecure? Here and now it demonstrably decreases the security.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: