Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Despite the question being flawed. The correct answer is a series of questions: Who is the attacker? What are you guarding? What assumptions are there about the operating environment? What invariants (regulations, compliance, etc) exist?

There may be compensating controls that invalidate the perceived needs for encryption or compression, for example. i.e. don't design in the dark.

Of course, the interviewer may just want a canned scripted answer - but the interview is your chance to shine, showing how you can discuss all the angles.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: