Hacker News new | past | comments | ask | show | jobs | submit login

> The scariest part of all of this is that much of the logging they're doing is remotely configurable

How is this scary at all - much less the "scariest part"? The vast majority of the bullet points also seem standard and not worth paying attention to. I also read the Penetrum paper he linked which was similarly unconvincing.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: