Hacker Newsnew | past | comments | ask | show | jobs | submit | ben-dh-kim's commentslogin

This can be a sensitive issue for organisations of a certain size. Depending on how widespread and complex the trust relationship is, it may or may not be a threat. But I think one of the points that everyone is questioning is how the first attack vector can be initiated. I agree with what you're saying about the complexity of IAM and trust relationships in general.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: