關注

To hack a system requires getting to know its rules better than the people who created it or are running it, and exploiting all the vulnerable distance between how those people had intended the system to work and how it actually works, or could be made to work. In capitalizing on these unintentional uses, hackers aren’t breaking the rules as much as debunking them.

Sign in to participate in the conversation
g0v.social

去中心化社群架設的去中心化社群網站 A decentralized social network hosted by a decentralized community.