Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I understand the appeal of this argument, but there are clearly cases where a computationally valid request and response is illegal despite the fact that the server "chose" to satisfy the request. An obvious example would be any exploit where an attacker can construct a particular request and get access to someone else's private data.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: