Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you think about this in the context of systems that ingest content from third party systems then this attack becomes more feasible.

But then, if you’re inside the network you’ve already overcome many of the boundaries

 help



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: