Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Just to be pendantic, a malicious user could write a script / program that implements tunneling but doesn't use the OS provided certificates.

But yeah that's definitely a best practice.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: