Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The window of installation time would be pretty minimal, and the operating window would only be as long as those who deployed while the malicious package was up waited to do another deploy.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: