Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"That letter is literally all it took for me to take control of a sub-block of someone else's public address space and get it routed to my network instead of theirs."

Interesting. I don't want some faceless central authority making it a bureaucratic nightmare to do what he's doing, but I also don't want malicious folks exploiting the vulnerability. What's the long game here? What should this process look like in 30 years?






Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: