Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

On "give users full control over their data." What about if a third party could use that user's account to gain access to their data? What are best practices around that?


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: