Hacker News
new
past
comments
ask
show
jobs
points
by
dpark
4 hours ago
|
comments
by
tyleo
4 hours ago
|
[-]
That doesn't sound right. For example, there's plenty of software with the correct observable behavior which leaks credentials. So what needs to be captured goes beyond observable behavior.
reply