Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wholeheartedly agree, the 'dragnet' methodology is already documented and well-known and that should factor into your security assessments.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: