Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Right, but you still have to convince the target to load that code willingly (directly or indirectly) so it's still harder than email. I except these shady networks to be mostly used on shady websites, so you can block them "at the source" so to speak.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: