Hacker News new | past | comments | ask | show | jobs | submit login

Why do you think this is possible when you have basically rogue apps that will abuse any provided infrastructure? The only real way around it is to review every app and only allow trusted programs.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: