Hacker News new | past | comments | ask | show | jobs | submit login

Other attacks would have to be targeted, in most cases. Replacing a standard file under .well-known can be automated.



Applications are open for YC Summer 2019

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: