Comment by mjevans
18 hours ago
Any solution I can think of uses a lot of resources. Those sort of methods are useful in some contexts, such as highly secure operations, but seem very excessive for the sort of abuse and leak encountered in this example.
No comments yet
Contribute on Hacker News ↗