Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They also (most likely) include many other, even network packet level checks in addition to primary and secondary authentication. Its not as simple as it looks to the honest end user.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: