Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is almost certainly it. There’s a lot of head-sand-burying around here about just how easily an attacker with access to logs of a not-even-that-large segment of the nodes can gain visibility into individuals’ service access patterns.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: