Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I love the way this is written. In just a paragraph any reader no matter what level of experience gets a good understanding of assumptions, strengths, and weaknesses of (my new fav term) 'tortoise-shell security (w/vry-juicy meat inside)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: