Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
stinos
on July 10, 2013
|
parent
|
context
|
favorite
| on:
Prism Break
Do you inspect every single line of code? Or at least grep the file list to see if you find a suspicious looking name? Don't think so. Your default assumption should thus be 'everything is compromised' since you did not verify it :]
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: