Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Do you mean “adversaries from the inside” could be more detailed to create reasonable limitations on access and resources as imposed by external systems (eg cameras, guards, searches) securing the machines?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: