Hacker News new | past | comments | ask | show | jobs | submit login

OK so I take it you agree that these techniques are not well-represented in the NIST report?



In NIST report, mainstream security recommendations... all kinds of places. Yeah. Only credit I'll give NIST report is it has some techniques that were used to build some of what's on my list.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: