Hacker News new | past | comments | ask | show | jobs | submit login

Sounds like it'd be bitch to counterfeit, but I think this just throws in the gauntlet for those interested in the challenge. Interested in what the processes they used to build the different features mentioned, at scale.



That's a good point, but I think it's a similar issue to computer security. Yeah, changing your SSH port to a custom one isn't going to keep out someone who scans your ports, but it will keep out the millions of losers who are looking for easy prey and not bothering with a portscan. With each security measure that is potentially crackable, but harder, the pool of crackers that are going to put in the effort gets smaller.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: