Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

One of my pet peeves is when UIs don't clearly constrain and delineate the extent of user-controlled text. Plenty of phishing attacks have relied on having attacker-controlled input seem authoritative, e.g. getting gmail to repeat back something to the victim.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: