Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The protocol should allow it, even if the implementation perhaps limits users to the local network or some other more sensible security policy.


This directly opposes design principles of secure and correct by construction.

If any of my colleagues would make an overly abstracted solution for a problem and ship it with a dsl to configure it, I would say no, and ask them to solve the problem at hand.


The implementation needs to be controllable and simple enough for basic users then. If something is possible, companies will abuse it.


If the protocol allows it, products using the protocol will require it.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: