Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Do you inspect every single line of code? Or at least grep the file list to see if you find a suspicious looking name? Don't think so. Your default assumption should thus be 'everything is compromised' since you did not verify it :]


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: