Hacker News new | past | comments | ask | show | jobs | submit login

It takes a security-through-obscurity approach, using random url's. The pro version, if enough demand, would include a private namespace with individual password protection for each file.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: