Hacker Newsnew | past | comments | ask | show | jobs | submitlogin



I don't think that's what I was going for? As far as I can see it relies on a locked down software stack to "prove" that the user is running blessed software on top of blessed hardware. That's one way of dealing with bots but I'm looking for a solution that doesn't lock us out of our own devices.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: