Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wonder whether they’re just looking at the exploits that worked against Tea (sounds like it could be the same from their description), or if they have staff that can find their own exploits.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: