Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> I don’t think any of that is necessary for me to extract your data.

I’ve not much interest in what anyone thinks in this regard, but I would be very interested in what one can prove is possible.

There is a whole lot here of “I could just this and I could just that.”

If you can “just” do all those things, I expect you’ll have no difficulty in executing this and providing evidence and data to support your assertions of ease of data exfiltration.

I’m not saying you’re incorrect, this is something I’d like to see anyone show concretely because I keep seeing that it’s apparently so simple to do and almost impossibly difficult to prevent that we should be overflowing with evidence to this surely already?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: