HN2new | past | comments | ask | show | jobs | submitlogin

Relying on the model for security is not security at all.

No amount of hardening or fine-tuning will make them immune to takeover via untrusted context





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: