Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
kbknapp
on Aug 26, 2021
|
parent
|
context
|
favorite
| on:
API Tokens: A Tedious Survey
A real attacker would try to minimize all those constraints by being collocated with the target as close as possible such as in the same datacenter or same rack if possible.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: