Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Seeing how often I've needed to crack some customer's mail client or wifi, or etc ... [*] I think we're already mostly there. (Though it's not always a dark and stormy night)

[*] Obviously after confirming it's really theirs and/or they have the requisite authority. The usual disclaimers apply.



It’s been awhile since I had to do that sort of thing. What challenges do you face and what tools do you use?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: