Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>each identified endpoint is programmatically queried to assess its security posture, with a particular focus on authentication and authorization mechanisms.

I know it's commonplace, but is this unauthorized access in terms of the CMA (UK) or CFAA (USA)?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: