Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

…as long as your tools are only in your hands to be used, correct? Once a tool is created and used on a machine with access to the greater internet, doesn’t your logic hold that its security is compromised inherently? Not saying you have been infiltrated, or a rogue employee has cleverly exported a copy or the methodology to duplicate it off-site, but I’m not saying that hasn’t happened either.


You can find a dozen projects on Github that do this, it's not sensitive information that needs protecting


It's not that hard to write this code. It's not a nuclear weapon.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: