Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And fundamentally insecure systems sooner or later get connected to things that should be secure and then become stepping stones in an exploit. These are lessons that should be learned by now.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: