Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Wait until you see the how many attacks can be carried out using Internet Protocol.


I'm also not the one making the claim that its well designed either.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: