Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The rules may seem absurd.

But consider this: You find documents marked "secret" on a laptop. What do you do? The documents happens to be possible to find online. Do you just shrug and move on? How do you know that this laptop was not used in the leak? What if you find thousands of different documents across your network. How do you verify whether or not they have leaked previously?

At the very least you end up spending more resources verifying that this was not caused by a security problem.

And the idea of spamming the military with classified documents would be hilarious to see in practice... I wonder what they'd do...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: