Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I understand the security spyware, though I think it's somewhat questionable there. But this sounds like deliberately putting all of your most sensitive data in a blender and then inevitably letting anyone get a taste of the smoothie.


Just like you'd secure data on a normal internal production system, I'd presume one wouldn't simply let anyone get a taste of the smoothie. But who knows -- move fast and break things, I guess.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: