Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you could, it would create an attack vector. From a security point, it's the right way to do things.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: