Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Note that "have access to a machine on the same subnet" really just means "can send traffic to the VM local network". In other words, partial compromises (ex: docker container, VM, chroot) that have access to this network are enough, as well as attacks that let you send traffic (ex: TURN server abuse)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: