Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

While I agree this is a good practice, it wouldn't have helped much. He had organization-level admin access and could've easily added a second dev account to accept them by himself.


This part of the discussion started thinking about an attacker with a goal of the malicious code being undetected.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: