Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I agree, I'm blown away at the level to which this kind of probing and exfiltration has been abstracted. Not quite surprised that years of iteration have led to this, but still, I didn't realize it'd become this easy.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: