Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Depends on the implementation, no? Another angle is that this theoretical attack might have tried that but failed/got foiled.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: