Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
js8
3 days ago
|
parent
|
context
|
favorite
| on:
Claude Sonnet 4.6
That's a common misconception. You can request a proof of harmlessness, and disregard anything without it.
help
csmpltn
3 days ago
[–]
No need to "ask" for "proof". You can monitor the system in real-time and detect malicious or potentially harmful activity and stop it early. The same tools and methodologies used by security tools for decades...
reply
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: