Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

the real question is also, when AWS becomes the "authorized, secure" source to whatever, while independent network nodes are marked as "unauthorized, untrusted" via some opaque mechanisms


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: