Hacker News new | past | comments | ask | show | jobs | submit login

That setup would also be a defense against potential bad actors acquiring one of the tools and somehow adding malicious code to it, so then people are quickly mobile to move to a comparable; like with the recent situation with The Great Suspender extension.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: