Hacker News new | past | comments | ask | show | jobs | submit login

Not necessarily, but I see your point. The threat model you suggest seems to be for a "one and done" event (which is a perfectly valid scenario). But the initial threat model was geared towards repeated, quick, and relatively inconspicuous access to a secure facility.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: