Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I completely agree - many attack vectors are more difficult, and some are impossible. However, saying "you can never get the data out of the cloud except via screenshot" is, first of all, untrue, as other means exist, and second, preventing access to data is not the most important security aspect of such a system.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: