Hacker News new | past | comments | ask | show | jobs | submit login

But it requires leaving a port open on the DB server where an attacker can get a whole copy of your database, or destroy it.



Many database servers are not serving databases solely to themselves and have that port open as part of the normal course of operation.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: