Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Technically analogous to pen testing except that it wasn’t done at the behest of the target, as legal pen testing is done. Hence it is indistinguishable from and must be considered, a malicious attack.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: