Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I cant help but think that any solution will have its vulnerabilities. Therefore redundancy and resiliency in the system design is the best approach.

Bad actors are going act bad no matter which way you go.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: