Comment by csmpltn
4 days ago
No need to "ask" for "proof". You can monitor the system in real-time and detect malicious or potentially harmful activity and stop it early. The same tools and methodologies used by security tools for decades...
4 days ago
No need to "ask" for "proof". You can monitor the system in real-time and detect malicious or potentially harmful activity and stop it early. The same tools and methodologies used by security tools for decades...
No comments yet
Contribute on Hacker News ↗