Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So, if you were someone who wanted to get through the security with some kind of dangerous object, wouldn't it make sense to map out those weaknesses? Therefore they also need to be tested against.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: