Hacker News new | past | comments | ask | show | jobs | submit login

I can also confirm that this is extremely common and basically standard practice. I frequently emulate my users when doing tech support. Even if this wasn't the case, unless everything in the database were encrypted per user, I could just query for their data.



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: