Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yep, and besides these concerns, there's the difficulty in modeling the trust relationships and dependencies in this kind of "secure internal network" world view. The relationships are complex and you have low likelihood of your mental model matching the reality, because the relationships are not explicitly configured.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: