Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There is absolutely nothing special about backends in this regard except that it’s more likely that the attacker doesn’t have access to the code or binary.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: