Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
dzink
on Aug 25, 2024
|
parent
|
context
|
favorite
| on:
Defenders think in lists, attackers think in graph...
Sounds like there need to be one or more honeypots in each network for catching intruders in the system. Fake crypto credentials, fake password storage etc.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: