Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Then you have a backup server that's privileged to access data from clients, which makes the backup server an attractive target.



Then you reduce the attack surface on this one special-purpose machine, which is much easier than doing the same on all your employees' desktops.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: