Hacker News new | past | comments | ask | show | jobs | submit login

See section 5.1 about threat model, hotspot just describes the threat model (network of distrusting clients). They do explicitly do test against some hotspot implementations, but the vulnerability isn’t limited to those.



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: