Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'd agree with you in theory, but in practice, those API endpoints end up being exploit vectors for data leakage in various ways - either through actual security vulns or through the security vulnerability that exists between the monitor and the chair.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: