Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
CGamesPlay
on June 18, 2018
|
parent
|
context
|
favorite
| on:
Backdoored images downloaded 5M times removed from...
Those are definitely good points. I'm curious about the part at the end: "An attacker with ro access to the socket can still create another container..." How is that possible with readonly socket access?
Consider applying for YC's Spring batch! Applications are open till Feb 11.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: