Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

No, really. I asked a specific question. What would a vulnerability that's not propaganda look like? Please explain how to distinguish between propaganda and non-popaganda vulnerabilities. I need to be able to distinguish between them for myself.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: