Hacker News new | past | comments | ask | show | jobs | submit login

There’s also the small matter of that attack mode having actually been fashionable amongst murderously-suicidal ideologue types over the years.

https://en.m.wikipedia.org/wiki/Timeline_of_airliner_bombing...

Security forces pay more attention to threat vectors that have a track record of actively being exploited.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: