Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Perhaps those companies should have performed verified backups of third-party vendor's published security policies into a secure enclave with paired keys with the auditor, to keep a trail of custody.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: