Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
jedberg
on Sept 11, 2018
|
parent
|
context
|
favorite
| on:
The Effectiveness of Publicly Shaming Bad Security
True, but then you'd have to make sure that all software that accesses that field is aware of the hash, and chances are if you have a legacy system like that, you have legacy software too.
Join us for
AI Startup School
this June 16-17 in San Francisco!
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: