Hacker News new | past | comments | ask | show | jobs | submit login

Much harder to install a key logger or other such shenanigans.



Install a key logger, when they already have someone on the end of the line willing to install and run whatever software they request? Why?

I think the marginal security value of denying root on the computer when you have already wangled root on the human is small.


Prior to modern AI, one could be done at scale, now I suppose both can which may change my calculus on this one. I hadn't thought about that until your comment. Thanks!




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: