Hacker News new | comments | show | ask | jobs | submit login

Other attacks would have to be targeted, in most cases. Replacing a standard file under .well-known can be automated.





Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: