Hacker News new | past | comments | ask | show | jobs | submit login

> Ok, let me ask: why? What is the absolute worst case scenario here? That a user in your organization gains admin privileges on their workstation?

I think the critical bit you're missing is that if a user can do something, a virus running under their credentials can do it too. Meaning I'd expect a virus can use this to get admin access.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: