Hacker News new | past | comments | ask | show | jobs | submit login

They have to know what normal access patterns look like, and if it looks unusual send confirmation magic links as well as look into what’s causing the unusual pattern, if anything.

The data they guard is up there with banking information except it’s impossible to restore privacy, unlike funds in a bank.




What features would you include in "look like"? Saying to just look at "normal behavior" is a bit like Intel saying they solved a problem with "algorithms and code" as an explanation




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: