Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A real attacker would try to minimize all those constraints by being collocated with the target as close as possible such as in the same datacenter or same rack if possible.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: