Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think the normal solution to this is all the prove you are the software you say you are calls is proxied to that software and all the normal services calls you want to log and duplicate or otherwise violate the contract are sent to the modified code.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: