Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If only BeyondTrust was called LeastTrust, it might not have used a global key to gain access to a load of very high-value targets.

To be fair though, most of what we use in these companies is a stack of containers of stuff that we just assume works properly, securely etc. and we don't really know if we use e.g. Citrix or VMWare or BeyondTrust or whatever, whether the software works as designed and whether it was only as secure as the people who wrote the code.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: