Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> never works as it should.

Not only that, by exploiting ambiguities and gaps, protocols can be made to work as they shouldn't. At least that keeps the security consultants in business.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: