Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Two things can be true at once. Them using their access to unencrypted messages for nefarious purposes and them being incompetent at the same time leaving that endpoint open.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: