Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> If this can be done with the source, it could have been done before, no?

This analysis is on-point, and something a lot of sources seem to miss. A determined actor can find the exact same exploits with and without access to the source code, though I admit it is much more complicated without ("determined").



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: