Hacker News new | past | comments | ask | show | jobs | submit login

Companies have security protocols for whatever they want to protect. What they consider protecting is their business. New product prototypes, or just random possible product explorations are a common example. And the protocols they use (special enclosures, training people on how to not be obvious) are figured out the same way they are in computing, In fact the core terminology we use in computer security comes from physical security.

And security protocols go back thousands of years. You can read about them in ancient literature,




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: