Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What happens in all these discussions is that we stealthily transition from "selling a vulnerability" to "planning a heist", and you can tell yourself any kind of story about planning a heist.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: