Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
js8
1mo ago
0 comments
Share
That's a common misconception. You can request a proof of harmlessness, and disregard anything without it.
0 comments
default
newest
oldest
csmpltn
1mo ago
No need to "ask" for "proof". You can monitor the system in real-time and detect malicious or potentially harmful activity and stop it early. The same tools and methodologies used by security tools for decades...
j
/
k
navigate · click thread line to collapse