logoalt Hacker News

srdjanrtoday at 8:12 AM1 replyview on HN

The author gave a few examples where compiled/minified code is public (Javascript and games) or automated vuln exploits (Wordpress example). That does explain nature of threat well enough for me.

There's a whole spectrum between 9 year old and a motivated state actor, and obfuscation is effective for a big part of the spectrum.


Replies

OhMeadhbhtoday at 2:05 PM

I was talking about the click-baity title more than the content.