Hacker News new | past | comments | ask | show | jobs | submit login




That's completely unrelated to cyber threat intelligence, except in situations like spear phishing, where the government (or anyone else trying to protect against attacks) might want to know what domains the attempts originated from or where the malicious links point back to.

Your linked article is completely irrelevant to this conversation. Why do you think they're related? Because the government is involved in both, and both have to do with the Internet?

You do realize the Internet is a big place, yes?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: