Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I interpreted OP's point as moving that kind of complexity to a black box would open it up to being compromised and then leveraged as a backdoor into your system, or as a botnet, etc.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: