Hacker News new | past | comments | ask | show | jobs | submit login

we (users) would catalog them by md5 hash and block them accordingly. It will always be an arms race: but at the end of the day; it's the users' computer, it's the users' connection.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: