Hacker News new | past | comments | ask | show | jobs | submit login

Shared hardware from the big cloud players adds attack vectors, but it also comes with some of the best security minds trying to keep the entire platform secure.

For example, they'll typically be on secret mailing lists and aware of security vulnerabilities weeks before you know about them.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: