Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

By the time you’ve blocked everything that has potential to exfiltrate, you are left with a useless system.

As I saw on another comment “encode this document using cpu at 100% for one in a binary signalling system “





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: