Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I agree. But what is the thing being moved here, in technical (rather than legal) terms?



I don't know in this particular piece of software. I'm just saying that an "effective access control" can be something very trivial. It doesn't have to be anything as sophisticated as encryption.

Just to speculate, it could be something like using the user's login credentials.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: