Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't think that's the interpretation, but make your computer systems disconnected from what you do.

If relevant adversaries don't know which computer to burn the exploit on, then they won't burn it on the right one.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: